default search action
Stefan Tillich
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j3]Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich:
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis. J. Cryptogr. Eng. 4(3): 157-171 (2014) - 2013
- [i8]Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich:
Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis. IACR Cryptol. ePrint Arch. 2013: 305 (2013) - 2012
- [j2]Philipp Grabher, Johann Großschädl, Simon Hoerder, Kimmo Järvinen, Daniel Page, Stefan Tillich, Marcin Wójcik:
An exploration of mechanisms for dynamic cryptographic instruction set extension. J. Cryptogr. Eng. 2(1): 1-18 (2012) - [c31]Robert Beat, Philipp Grabher, Daniel Page, Stefan Tillich, Marcin Wójcik:
On reconfigurable fabrics and generic side-channel countermeasures. FPL 2012: 663-666 - [c30]Stefan Tillich, Marcin Wójcik:
Security Analysis of an Open Car Immobilizer Protocol Stack. INTRUST 2012: 83-94 - [c29]Johann Großschädl, Dan Page, Stefan Tillich:
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices. WISTP 2012: 189-207 - [i7]Robert Beat, Philipp Grabher, Dan Page, Stefan Tillich, Marcin Wójcik:
On Reconfigurable Fabrics and Generic Side-Channel Countermeasures. IACR Cryptol. ePrint Arch. 2012: 353 (2012) - [i6]Stefan Tillich, Marcin Wójcik:
Security Analysis of an Open Car Immobilizer Protocol Stack. IACR Cryptol. ePrint Arch. 2012: 617 (2012) - 2011
- [c28]Stefan Tillich, Mario Kirschbaum, Alexander Szekely:
Implementation and Evaluation of an SCA-Resistant Embedded Processor. CARDIS 2011: 151-165 - [c27]Philipp Grabher, Johann Großschädl, Simon Hoerder, Kimmo Järvinen, Dan Page, Stefan Tillich, Marcin Wójcik:
An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extension. CHES 2011: 1-16 - [c26]Simon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page:
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture. WISTP 2011: 160-174 - 2010
- [c25]Stefan Tillich, Mario Kirschbaum, Alexander Szekely:
SCA-resistant embedded processors: the next generation. ACSAC 2010: 211-220 - [c24]Jean-François Gallais, Johann Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni, Jörn-Marc Schmidt, Stefan Tillich, Marcin Wójcik:
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software. INTRUST 2010: 253-270 - [i5]Simon Hoerder, Marcin Wójcik, Stefan Tillich, Dan Page:
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture. IACR Cryptol. ePrint Arch. 2010: 614 (2010)
2000 – 2009
- 2009
- [c23]Jörn-Marc Schmidt, Stefan Tillich:
On the Security of Untrusted Memory. ARES 2009: 329-334 - [c22]Gernot R. Bauer, Philipp Potisk, Stefan Tillich:
Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes. PDP 2009: 371-378 - [c21]Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich:
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. WISTP 2009: 112-127 - [i4]Stefan Tillich:
Hardware Implementation of the SHA-3 Candidate Skein. IACR Cryptol. ePrint Arch. 2009: 159 (2009) - [i3]Stefan Tillich, Martin Feldhofer, Wolfgang Issovits, Thomas Kern, Hermann Kureck, Michael Mühlberghuber, Georg Neubauer, Andreas Reiter, Armin Köfler, Mathias Mayrhofer:
Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Gröstl, and Skein. IACR Cryptol. ePrint Arch. 2009: 349 (2009) - [i2]Stefan Tillich, Martin Feldhofer, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Alexander Szekely:
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gröstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein. IACR Cryptol. ePrint Arch. 2009: 510 (2009) - 2008
- [j1]Stefan Tillich, Martin Feldhofer, Thomas Popp, Johann Großschädl:
Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box. J. Signal Process. Syst. 50(2): 251-261 (2008) - [c20]Stefan Tillich, Christoph Herbst:
Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. CHES 2008: 228-243 - [c19]Stefan Tillich, Christoph Herbst:
Boosting AES Performance on a Tiny Processor Core. CT-RSA 2008: 170-186 - [c18]Stefan Kraxberger, Udo Payer, Stefan Tillich:
General security concept for embedded P2P systems. MobiQuitous 2008 - 2007
- [c17]Stefan Tillich, Christoph Herbst, Stefan Mangard:
Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. ACNS 2007: 141-157 - [c16]Johann Großschädl, Alexander Szekely, Stefan Tillich:
The energy cost of cryptographic key establishment in wireless sensor networks. AsiaCCS 2007: 380-382 - [c15]Stefan Tillich, Johann Großschädl:
Power Analysis Resistant AES Implementation with Instruction Set Extensions. CHES 2007: 303-319 - [c14]Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann, Marcel Medwed:
Energy evaluation of software implementations of block ciphers under memory constraints. DATE 2007: 1110-1115 - [c13]Johann Großschädl, Stefan Tillich, Alexander Szekely:
Performance Evaluation of Instruction Set Extensions for Long Integer Modular Arithmetic on a SPARC V8 Processor. DSD 2007: 680-689 - [c12]Stefan Tillich, Johann Großschädl:
VLSI Implementation of a Functional Unit to Accelerate ECC and AES on 32-Bit Processors. WAIFI 2007: 40-54 - [i1]Johann Großschädl, Alexander Szekely, Stefan Tillich:
The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks. IACR Cryptol. ePrint Arch. 2007: 3 (2007) - 2006
- [c11]Stefan Tillich, Johann Großschädl:
Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors. CHES 2006: 270-284 - [c10]Manuel Koschuch, Joachim Lechner, Andreas Weitzer, Johann Großschädl, Alexander Szekely, Stefan Tillich, Johannes Wolkerstorfer:
Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller. CHES 2006: 430-444 - [c9]Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich:
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. CT-RSA 2006: 192-207 - [c8]Johann Großschädl, Paolo Ienne, Laura Pozzi, Stefan Tillich, Ajay Kumar Verma:
Combining algorithm exploration with instruction set design: a case study in elliptic curve cryptography. DATE 2006: 218-223 - [c7]Stefan Tillich, Martin Feldhofer, Johann Großschädl:
Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box. SAMOS 2006: 457-466 - 2005
- [c6]Johann Großschädl, Roberto Maria Avanzi, Erkay Savas, Stefan Tillich:
Energy-Efficient Software Implementation of Long Integer Modular Arithmetic. CHES 2005: 75-90 - [c5]Stefan Tillich, Johann Großschädl, Alexander Szekely:
An Instruction Set Extension for Fast and Memory-Efficient AES Implementation. Communications and Multimedia Security 2005: 11-21 - [c4]Stefan Tillich, Johann Großschädl:
Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography. ICCSA (2) 2005: 665-675 - 2004
- [c3]Stefan Tillich, Johann Großschädl:
A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2m). Asia-Pacific Computer Systems Architecture Conference 2004: 282-295 - [c2]Stefan Tillich, Johann Großschädl:
A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices. ISCIS 2004: 935-944 - [c1]Johann Großschädl, Karl C. Posch, Stefan Tillich:
Architectural Enhancements to Support Digital Signal Processing and Public-Key Cryptography. WISES 2004: 129-143
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint