default search action
Michael Hutter
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Aein Rezaei Shahmirzadi, Michael Hutter:
Efficient Boolean-to-Arithmetic Mask Conversion in Hardware. IACR Commun. Cryptol. 1(3): 46 (2024) - [c43]Dur-e-Shahwar Kundi, Jose M. Bermudo Mera, Pierre-Yves Strub, Michael Hutter:
High-Performance NTT Hardware Accelerator to Support ML-KEM and ML-DSA. ASHES@CCS 2024: 100-105 - [i11]Aein Rezaei Shahmirzadi, Michael Hutter:
Efficient Boolean-to-Arithmetic Mask Conversion in Hardware. IACR Cryptol. ePrint Arch. 2024: 1633 (2024) - 2021
- [c42]Jaume Abella, Sergi Alcaide, Jens Anders, Francisco Bas, Steffen Becker, Elke De Mulder, Nourhan Elhamawy, Frank K. Gürkaynak, Helena Handschuh, Carles Hernández, Michael Hutter, Leonidas Kosmidis, Ilia Polian, Matthias Sauer, Stefan Wagner, Francesco Regazzoni:
Security, Reliability and Test Aspects of the RISC-V Ecosystem. ETS 2021: 1-10 - 2020
- [j11]Michael Hutter, Erich Wenger:
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. J. Cryptol. 33(4): 1442-1460 (2020) - [j10]Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark E. Marson:
Low-Latency Hardware Masking with Application to AES. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 300-326 (2020) - [i10]Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark E. Marson:
Low-Latency Hardware Masking with Application to AES. IACR Cryptol. ePrint Arch. 2020: 51 (2020)
2010 – 2019
- 2019
- [j9]Michael Hutter, Michael Tunstall:
Constant-time higher-order Boolean-to-arithmetic masking. J. Cryptogr. Eng. 9(2): 173-184 (2019) - [c41]Elke De Mulder, Samatha Gummalla, Michael Hutter:
Protecting RISC-V against Side-Channel Attacks. DAC 2019: 45 - 2018
- [j8]Michael Hutter, Erich Wenger:
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. J. Cryptol. 31(4): 1164-1182 (2018) - [c40]Pascal Sasdrich, Michael Hutter:
Protecting Triple-DES Against DPA - A Practical Application of Domain-Oriented Masking. COSADE 2018: 207-226 - 2017
- [c39]Melissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson:
A Side-Channel Assisted Cryptanalytic Attack Against QcBits. CHES 2017: 3-23 - [i9]Melissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson:
A Side-Channel Assisted Cryptanalytic Attack Against QcBits. IACR Cryptol. ePrint Arch. 2017: 596 (2017) - 2016
- [c38]Michael Hutter:
Threshold Implementations in Industry: A Case Study on SHA-256. TIS@CCS 2016: 37 - [i8]Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser:
NaCl's Crypto_Box in Hardware. IACR Cryptol. ePrint Arch. 2016: 330 (2016) - [i7]Michael Hutter, Michael Tunstall:
Constant-Time Higher-Order Boolean-to-Arithmetic Masking. IACR Cryptol. ePrint Arch. 2016: 1023 (2016) - 2015
- [j7]Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe:
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. Des. Codes Cryptogr. 77(2-3): 493-514 (2015) - [j6]Michael Hutter, Peter Schwabe:
Multiprecision multiplication on AVR revisited. J. Cryptogr. Eng. 5(3): 201-214 (2015) - [j5]Honorio Martín, Thomas Korak, Enrique San Millán, Michael Hutter:
Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness. IEEE Trans. Inf. Forensics Secur. 10(2): 266-277 (2015) - [c37]Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser:
NaCl's Crypto_box in Hardware. CHES 2015: 81-101 - [c36]Michael Muehlberghuber, Thomas Korak, Philipp Dunst, Michael Hutter:
Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASIC. COSADE 2015: 222-236 - [i6]Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe:
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. IACR Cryptol. ePrint Arch. 2015: 343 (2015) - 2014
- [j4]Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson:
Using Bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA: extended version. J. Cryptogr. Eng. 4(1): 33-45 (2014) - [c35]Wolfgang Wieser, Michael Hutter:
Efficient Multiplication on Low-Resource Devices. DSD 2014: 175-182 - [c34]Thomas Korak, Michael Hutter, Baris Ege, Lejla Batina:
Clock Glitch Attacks in the Presence of Heating. FDTC 2014: 104-114 - [c33]Oliver Soll, Thomas Korak, Michael Muehlberghuber, Michael Hutter:
EM-based detection of hardware trojans on FPGAs. HOST 2014: 84-87 - [c32]Gesine Hinterwälder, Amir Moradi, Michael Hutter, Peter Schwabe, Christof Paar:
Full-Size High-Security ECC Implementation on MSP430 Microcontrollers. LATINCRYPT 2014: 31-47 - [c31]Thomas Korak, Michael Hutter:
On the power of active relay attacks using custom-made proxies. IEEE RFID 2014: 126-133 - [c30]Hannes Groß, Erich Wenger, Honorio Martín, Michael Hutter:
PIONEER - a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag. RFIDSec 2014: 54-73 - [c29]Peter Pessl, Michael Hutter:
Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID. RFIDSec 2014: 156-172 - [i5]Michael Hutter, Jörn-Marc Schmidt:
The Temperature Side Channel and Heating Fault Attacks. IACR Cryptol. ePrint Arch. 2014: 190 (2014) - [i4]Michael Hutter, Peter Schwabe:
Multiprecision multiplication on AVR revisited. IACR Cryptol. ePrint Arch. 2014: 592 (2014) - 2013
- [j3]Thomas Plos, Michael Hutter, Martin Feldhofer, Maksimiljan Stiglic, Francesco Cavaliere:
Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography. IEEE Trans. Very Large Scale Integr. Syst. 21(11): 1965-1974 (2013) - [c28]Michael Hutter, Peter Schwabe:
NaCl on 8-Bit AVR Microcontrollers. AFRICACRYPT 2013: 156-172 - [c27]Michael Hutter, Jörn-Marc Schmidt:
The Temperature Side Channel and Heating Fault Attacks. CARDIS 2013: 219-235 - [c26]Peter Pessl, Michael Hutter:
Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID. CHES 2013: 126-141 - [c25]Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson:
Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA. CHES 2013: 435-452 - [c24]Michael Muehlberghuber, Frank K. Gürkaynak, Thomas Korak, Philipp Dunst, Michael Hutter:
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC. HASP@ISCA 2013: 1 - [e1]Michael Hutter, Jörn-Marc Schmidt:
Radio Frequency Identification - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8262, Springer 2013, ISBN 978-3-642-41331-5 [contents] - [i3]Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson:
Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA. IACR Cryptol. ePrint Arch. 2013: 346 (2013) - [i2]Michael Hutter, Peter Schwabe:
NaCl on 8-Bit AVR Microcontrollers. IACR Cryptol. ePrint Arch. 2013: 375 (2013) - [i1]Peter Pessl, Michael Hutter:
Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID. IACR Cryptol. ePrint Arch. 2013: 439 (2013) - 2012
- [c23]Nashwa A. F. Mohamed, Mohsin H. A. Hashim, Michael Hutter:
Improved Fixed-Base Comb Method for Fast Scalar Multiplication. AFRICACRYPT 2012: 342-359 - [c22]Markus Pelnar, Michael Muehlberghuber, Michael Hutter:
Putting together What Fits together - GrÆStl. CARDIS 2012: 173-187 - [c21]Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Stefan Mangard:
Exploiting the Difference of Side-Channel Leakages. COSADE 2012: 1-16 - [c20]Thomas Korak, Thomas Plos, Michael Hutter:
Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario. COSADE 2012: 17-32 - 2011
- [j2]Ronald Toegl, Michael Hutter:
An approach to introducing locality in remote attestation using near field communications. J. Supercomput. 55(2): 207-227 (2011) - [c19]Michael Hutter, Marc Joye, Yannick Sierra:
Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation. AFRICACRYPT 2011: 170-187 - [c18]Erich Wenger, Michael Hutter:
A Hardware Processor Supporting Elliptic Curve Cryptography for Less than 9 kGEs. CARDIS 2011: 182-198 - [c17]Michael Hutter, Erich Wenger:
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. CHES 2011: 459-474 - [c16]Erich Wenger, Michael Hutter:
Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations. NordSec 2011: 256-271 - [c15]Christian Pendl, Markus Pelnar, Michael Hutter:
Elliptic Curve Cryptography on the WISP UHF RFID Tag. RFIDSec 2011: 32-47 - [c14]Wolfgang Issovits, Michael Hutter:
Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks. RFID-TA 2011: 335-342 - [c13]Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer:
A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines. WISTP 2011: 144-159 - 2010
- [j1]Michael Hutter, Thomas Plos, Martin Feldhofer:
On the security of RFID devices against implementation attacks. Int. J. Secur. Networks 5(2/3): 106-118 (2010) - [c12]Jörn-Marc Schmidt, Thomas Plos, Mario Kirschbaum, Michael Hutter, Marcel Medwed, Christoph Herbst:
Side-Channel Leakage across Borders. CARDIS 2010: 36-48 - [c11]Martin Feldhofer, Manfred Josef Aigner, Thomas Baier, Michael Hutter, Thomas Plos, Erich Wenger:
Semi-passive RFID development platform for implementing and attacking security tags. ICITST 2010: 1-6 - [c10]Michael Hutter, Martin Feldhofer, Thomas Plos:
An ECDSA Processor for RFID Authentication. RFIDSec 2010: 189-202
2000 – 2009
- 2009
- [c9]Michael Hutter, Marcel Medwed, Daniel M. Hein, Johannes Wolkerstorfer:
Attacking ECDSA-Enabled RFID Devices. ACNS 2009: 519-534 - [c8]Michael Hutter, Jörn-Marc Schmidt, Thomas Plos:
Contact-based fault injections and power analysis on RFID tags. ECCTD 2009: 409-412 - [c7]Jörn-Marc Schmidt, Michael Hutter, Thomas Plos:
Optical Fault Attacks on AES: A Threat in Violet. FDTC 2009: 13-22 - [c6]Michael Hutter, Alexander Szekely, Johannes Wolkerstorfer:
Embedded system management using WBEM. Integrated Network Management 2009: 390-397 - [c5]Michael Hutter:
RFID Authentication Protocols based on Elliptic Curves - A Top-Down Evaluation Survey. SECRYPT 2009: 101-110 - [c4]Thomas Plos, Michael Hutter, Martin Feldhofer:
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices. WISA 2009: 163-177 - 2008
- [c3]Thomas Lorünser, Edwin Querasser, Thomas Matyus, Momtchil Peev, Johannes Wolkerstorfer, Michael Hutter, Alexander Szekely, Ilse Wimberger, Christian Pfaffel-Janser, Andreas Neppach:
Security processor with quantum key distribution. ASAP 2008: 37-42 - [c2]Michael Hutter, Jörn-Marc Schmidt, Thomas Plos:
RFID and Its Vulnerability to Faults. CHES 2008: 363-379 - 2007
- [c1]Michael Hutter, Stefan Mangard, Martin Feldhofer:
Power and EM Attacks on Passive 13.56 MHz RFID Devices. CHES 2007: 320-333
1990 – 1999
- 1992
- [p1]Michael Hutter:
Selbstorganisation in sozialen Systemen - Eine Theorie und ihre Anwendung auf Wirtschaftssysteme. Aspekte der Selbstorganisation 1992: 86-97
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint