FWF - ReSIT - Realizing a Secure Internet of Things

  • Hutter, Michael (Co-Investigator (CoI))
  • Wenger, Erich (Co-Investigator (CoI))
  • Schmidt, Jörn-Marc (Co-Investigator (CoI))
  • Mendel, Florian (Co-Investigator (CoI))
  • Mangard, Stefan (Co-Investigator (CoI))
  • Posch, Reinhard (Principal Investigator (PI))

Project: Research project

Search results

  • 2017

    Ascon hardware implementations and side-channel evaluation

    Groß, H., Wenger, E., Dobraunig, C. & Ehrenhöfer, C., 2017, In: Microprocessors and Microsystems - Embedded Hardware Design. 52, p. 470-479 10 p.

    Research output: Contribution to journalArticlepeer-review

  • 2015

    Privacy-Aware Authentication in the Internet of Things

    Groß, H., Hölbl, M., Slamanig, D. & Spreitzer, R., 2015, 14th International Conference on Cryptology and Network Security (CANS 2015) . LNCS ed. Springer Verlag, Vol. 9476. p. 32-39 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Sharing is Caring—On the Protection of Arithmetic Logic Units against Passive Physical Attacks

    Groß, H., 2015, (Accepted/In press) Workshop on RFID Security - RFIDsec 2015, 11th Workshop, New York, USA, June 22 - 23, 2014, Proceedings.. Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • 2014

    Curved Tags - A Low-Resource ECDSA Implementation tailored for RFID

    Peßl, P. & Hutter, M., 2014, Workshop on RFID Security - RFIDsec 2014, 10th Workshop, Oxford, UK, July 21 -23, 2014, Proceedings.. Springer, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
  • Efficient Multiplication on Low-Resource Devices

    Wieser, W. & Hutter, M., 2014, (Accepted/In press) Euromicro Conference on Digital System Design Architectures, Methods and Tools -- DSD 2014, Verona, Italy, August, 27-29, 2014, Proceedings. IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Full-Size High-Security ECC Implementation on MSP430 Microcontrollers

    Hinterwälder, G., Moradi, A., Hutter, M., Schwabe, P. & Paar, C., 2014, (Accepted/In press) Third International Conference on Cryptology and Information Security in Latin America - LATINCRYPT 2014, Florianopolis, Brazil, September 17-19, 2014. Proceedings.. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • PIONEER - a Prototype for the Internet of Things based on an Extendable EPC Gen2 RFID Tag

    Groß, H., Wenger, E., Martín, H. & Hutter, M., 2014, Workshop on RFID Security - RFIDsec 2014, 10th Workshop, Oxford, UK, July 21 -23, 2014, Proceedings.. Springer, p. 54-73 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • 2013

    Access Without Permission: A Practical RFID Relay Attack

    Silberschneider, R., Korak, T. & Hutter, M., 2013, Austrochip 2013, 21st Austrian Workshop on Microelectronics, Linz, Austria, October 10, 2013, Proceedings. Linz: ., p. 59-64

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    File
  • AES-Based Lightweight Authenticated Encryption

    Bogdanov, A., Mendel, F., Regazzoni, F., Rijmen, V. & Tischhauser, E., 2013, Fast Software Encryption. Springer, Vol. 8424. p. 447-466 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • A Lightweight ATmega-based Application-Specific Instruction-Set Processor for Elliptic Curve Cryptography

    Wenger, E., 2013, Lightweight Cryptography for Security and Privacy, Second International Workshop, LightSec 2013, Gebze, Turkey, May 2013, Revised Selected Papers. Berlin Heidelberg: Springer, p. 1-15 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Cache-Access Pattern Attack on Disaligned AES T-Tables

    Spreitzer, R. & Plos, T., 2013, Constructive Side-Channel Analysis and Secure Design - COSADE 2013, 4th International Workshop, Paris, France, March 7-8, 2013, Proceedings.. Springer, p. 200-214 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Differential Cryptanalysis of Keccak Variants

    Kölbl, S., Mendel, F., Nad, T. & Schläffer, M., 2013, Cryptography and Coding. Springer, Vol. 8308. p. 141-157 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Efficient Vector Implementations of AES-based Designs: A Case Study and New Implementations for Grøstl

    Holzer-Graf, S., Krinninger, T., Pernull, M. A., Schläffer, M., Schwabe, P., Seywald, D. & Wieser, W., 2013, CT-RSA. ., Vol. 7779. p. 145-161 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Fast Software Encryption Attacks on AES

    Gstir, D. & Schläffer, M., 2013, Africacrypt. Springer, Vol. 7918. p. 359-374 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware

    Bilgin, B., Bogdanov, A., Mendel, F., Wang, Q. & Knezevic, M., 2013, Cryptographic Hardware and Embedded Systems - CHES 2013. Berlin, Heidelberg: Springer, p. 142-158 (Lecture Notes in Computer Science; vol. 8086).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Improving Local Collisions: New Attacks on Reduced SHA-256

    Mendel, F., Nad, T. & Schläffer, M., 2013, Advances in Cryptology – EUROCRYPT 2013. Springer, p. 262-278

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Linear Propagation in Efficient Guess-and-Determine Attacks

    Eichlseder, M., Mendel, F., Nad, T., Rijmen, V. & Schläffer, M., 2013, International Workshop on Coding and Cryptography. p. 193-202

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • NaCl on 8-bit AVR Microcontrollers

    Hutter, M. & Schwabe, P., 2013, Progress in Cryptology – AFRICACRYPT 2013 Sixth International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings.. Berlin Heidelberg: Springer, Vol. 7918. p. 156-172 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • On the Applicability of Time-Driven Cache Attacks on Mobile Devices

    Spreitzer, R. & Plos, T., 2013, Network and System Security - NSS 2013, 7th International Conference, Madrid, Spain, June 3-4, 2013, Proceedings. Springer, Vol. 7873. p. 656-662 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Pushing The Limits of SHA-3 Hardware Implementations to Fit on RFID

    Peßl, P. & Hutter, M., 2013, Cryptographic Hardware and Embedded Systems - CHES 2013, 14th International Workshop, Santa Barbara, California, USA, August 20-23, 2013, Proceedings.. Berlin Heidelberg: Springer, Vol. 8086. p. 126-141 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • The Temperature Side-Channel and Heating Fault Attacks

    Hutter, M. & Schmidt, J-M., 2013, (Accepted/In press) Smart Card Research and Advanced Applications - CARDIS 2013, 12th International Conference, Berlin, Germany, November 27-29, 2013, Proceedings.. ., (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • 2012

    JAAVR: Introducing the Next Generation of Security-enabled RFID Tags

    Wenger, E., Baier, T. & Feichtner, J., 2012, Digital System Design (DSD), 2012 15th Euromicro Conference on. Institute of Electrical and Electronics Engineers, p. 640-647

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File