Classic McEliece DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ... NIST Submission, 2017 | 211* | 2017 |
Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices S Heyse, I Maurich, T Güneysu International Conference on Cryptographic Hardware and Embedded Systems, 273-292, 2013 | 126 | 2013 |
Lightweight code-based cryptography: QC-MDPC McEliece encryption on reconfigurable devices I von Maurich, T Güneysu Proceedings of the conference on Design, Automation & Test in Europe, 38, 2014 | 80 | 2014 |
Compact implementation and performance evaluation of hash functions in attiny devices J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ... International Conference on Smart Card Research and Advanced Applications …, 2012 | 71 | 2012 |
Classic McEliece MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ... NIST Post-Quantum Cryptography Standardization Project (Round 3), https …, 2020 | 69 | 2020 |
Implementing qc-mdpc mceliece encryption IV Maurich, T Oder, T Güneysu ACM Transactions on Embedded Computing Systems (TECS) 14 (3), 1-27, 2015 | 63 | 2015 |
Towards side-channel resistant implementations of QC-MDPC McEliece encryption on constrained devices I Maurich, T Güneysu International Workshop on Post-Quantum Cryptography, 266-282, 2014 | 57 | 2014 |
Differential power analysis of a McEliece cryptosystem C Chen, T Eisenbarth, I Maurich, R Steinwandt International Conference on Applied Cryptography and Network Security, 538-556, 2015 | 53 | 2015 |
IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter I von Maurich, L Heberle, T Güneysu International Workshop on Post-Quantum Cryptography, 1-17, 2016 | 28 | 2016 |
Cloning Cryptographic RFID Cards for 25$ T Kasper, I von Maurich, D Oswald, C Paar Benelux Workshop on Information and System Security, 29-30, 2010 | 26 | 2010 |
Horizontal and vertical side channel analysis of a McEliece cryptosystem C Chen, T Eisenbarth, I von Maurich, R Steinwandt IEEE Transactions on Information Forensics and Security 11 (6), 1093-1105, 2015 | 25 | 2015 |
Chameleon: A versatile emulator for contactless smartcards T Kasper, I Maurich, D Oswald, C Paar International Conference on Information Security and Cryptology, 189-206, 2010 | 23 | 2010 |
Faster hash-based signatures with bounded leakage T Eisenbarth, I Maurich, X Ye International Conference on Selected Areas in Cryptography, 223-243, 2013 | 21 | 2013 |
Masking Large Keys in Hardware: A Masked Implementation of McEliece C Chen, T Eisenbarth, I von Maurich, R Steinwandt | 20 | 2015 |
Evaluation of SHA-3 candidates for 8-bit embedded processors S Heyse, I von Maurich, A Wild, C Reuber, J Rave, T Poeppelmann, ... Presentation at the 2nd SHA-3 Candidate Conference, Santa Barbara, CA, USA, 2010 | 20* | 2010 |
A performance boost for hash-based signatures T Eisenbarth, I Maurich, C Paar, X Ye Number Theory and Cryptography, 166-182, 2013 | 8 | 2013 |
Efficient implementation of cryptographic primitives on the GA144 multi-core architecture T Schneider, I Von Maurich, T Güneysu 2013 IEEE 24th International Conference on Application-Specific Systems …, 2013 | 7 | 2013 |
Embedded syndrome-based hashing I Von Maurich, T Güneysu International Conference on Cryptology in India, 339-357, 2012 | 7 | 2012 |
Cryptographic algorithms on the GA144 asynchronous multi-core processor T Schneider, I von Maurich, T Güneysu, D Oswald Journal of Signal Processing Systems 77 (1), 151-167, 2014 | 5 | 2014 |
Efficient Implementation of Code-and Hash-based Cryptography I von Maurich Bochum, Ruhr-Universität Bochum, 2016 | 3 | 2016 |