Andy Rupp
Andy Rupp
University of Luxembourg
Verified email at rub.de - Homepage
Title
Cited by
Cited by
Year
Cryptanalysis with COPACOBANA
T Güneysu, T Kasper, M Novotný, C Paar, A Rupp
IEEE Transactions on computers 57 (11), 1498-1513, 2008
1962008
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?
A Bogdanov, T Eisenbarth, A Rupp, C Wolf
International Workshop on Cryptographic Hardware and Embedded Systems, 45-61, 2008
842008
A real-world attack breaking A5/1 within hours
T Gendrullis, M Novotný, A Rupp
International Workshop on Cryptographic Hardware and Embedded Systems, 266-282, 2008
682008
How to Break DES for BC 8,980
S Kumar, C Paar, J Pelzl, G Pfeiffer, A Rupp, M Schimmler
SHARCS ‘06–Special-purpose Hardware for Attacking Cryptographic Systems, 17-35, 2006
492006
How to Break DES for BC 8,980
S Kumar, C Paar, J Pelzl, G Pfeiffer, A Rupp, M Schimmler
SHARCS ‘06–Special-purpose Hardware for Attacking Cryptographic Systems, 17-35, 2006
492006
How to Break DES for BC 8,980
S Kumar, C Paar, J Pelzl, G Pfeiffer, A Rupp, M Schimmler
SHARCS ‘06–Special-purpose Hardware for Attacking Cryptographic Systems, 17-35, 2006
492006
A parallel hardware architecture for fast Gaussian elimination over GF (2)
A Rupp, J Pelzl, C Paar, MC Mertens, A Bogdanov
2006 14th Annual IEEE Symposium on Field-Programmable Custom Computing …, 2006
442006
Fast multivariate signature generation in hardware: The case of rainbow
S Balasubramanian, HW Carter, A Bogdanov, A Rupp, J Ding
2008 International Conference on Application-Specific Systems, Architectures …, 2008
412008
Polynomial spaces: A new framework for composite-to-prime-order transformations
G Herold, J Hesse, D Hofheinz, C Ràfols, A Rupp
Annual Cryptology Conference, 261-279, 2014
322014
ECRYPT yearly report on algorithms and keysizes
S Babbage, D Catalano, C Cid, B de Weger, O Dunkelman, C Gehrmann, ...
322009
On the equivalence of RSA and factoring regarding generic ring algorithms
G Leander, A Rupp
International Conference on the Theory and Application of Cryptology and …, 2006
322006
A hardware-assisted realtime attack on A5/2 without precomputations
A Bogdanov, T Eisenbarth, A Rupp
International Workshop on Cryptographic Hardware and Embedded Systems, 394-412, 2007
252007
Standard versus selective opening security: separation and equivalence results
D Hofheinz, A Rupp
Theory of Cryptography Conference, 591-615, 2014
242014
mathcal {MQ} $-Cryptosystems as Replacement for Elliptic Curves
A Bogdanov, T Eisenbarth, A Rupp, C Wolf, TAOPK Engines
Proceeding sof the 10th international workshop on Cryptographic Hardware and …, 2008
212008
Packet trace manipulation rramework for test labs
A Rupp, H Dreger, A Feldmann, R Sommer
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 251-256, 2004
202004
Public-key encryption with simulation-based selective-opening security and compact ciphertexts
D Hofheinz, T Jager, A Rupp
Theory of Cryptography Conference, 146-168, 2016
192016
SMITH-A parallel hardware architecture for fast Gaussian elimination over GF (2)
A Bogdanov, MC Mertens, C Paar, J Pelzl, A Rupp
Workshop on Special-purpose Hardware for Attacking Cryptographic Systems …, 2006
192006
Cryptographic theory meets practice: Efficient and privacy-preserving payments for public transport
A Rupp, F Baldimtsi, G Hinterwälder, C Paar
ACM Transactions on Information and System Security (TISSEC) 17 (3), 1-31, 2015
162015
P4R: Privacy-preserving pre-payments with refunds for transportation systems
A Rupp, G Hinterwälder, F Baldimtsi, C Paar
International Conference on Financial Cryptography and Data Security, 205-212, 2013
162013
Sufficient conditions for intractability over black-box groups: Generic lower bounds for generalized DL and DH problems
A Rupp, G Leander, E Bangerter, AW Dent, AR Sadeghi
International Conference on the Theory and Application of Cryptology and …, 2008
162008
The system can't perform the operation now. Try again later.
Articles 1–20