Thomas Plos

According to our database1, Thomas Plos authored at least 31 papers between 2008 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
EM Leakage of RFID Devices - Comparison of Two Measurement Approaches.
Proceedings of the Ninth International Conference on Availability, 2014

Hardware and VLSI Designs.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography.
IEEE Trans. Very Large Scale Integr. Syst., 2013

On measuring the parasitic backscatter of sensor-enabled UHF RFID tags.
Inf. Secur. Tech. Rep., 2013

On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version).
IACR Cryptol. ePrint Arch., 2013

On the Applicability of Time-Driven Cache Attacks on Mobile Devices.
Proceedings of the Network and System Security - 7th International Conference, 2013

A Security-Enhanced UHF RFID Tag Chip.
Proceedings of the 2013 Euromicro Conference on Digital System Design, 2013

Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Cache-Access Pattern Attack on Disaligned AES T-Tables.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

Minimizing the Costs of Side-Channel Analysis Resistance Evaluations in Early Design Steps.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

On Secure Multi-party Computation in Bandwidth-Limited Smart-Meter Systems.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptol. ePrint Arch., 2012

On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012

Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA.
Proceedings of the Progress in Cryptology, 2012

Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

Exploiting the Difference of Side-Channel Leakages.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag.
Proceedings of the Security and Privacy in Communication Networks, 2011

Hardware Implementation of a Flexible Tag Platform for Passive RFID Devices.
Proceedings of the 14th Euromicro Conference on Digital System Design, 2011

2010
On the security of RFID devices against implementation attacks.
Int. J. Secur. Networks, 2010

Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

An ECDSA Processor for RFID Authentication.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Semi-passive RFID development platform for implementing and attacking security tags.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Side-Channel Leakage across Borders.
Proceedings of the Smart Card Research and Advanced Application, 2010

2009
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gröstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein.
IACR Cryptol. ePrint Arch., 2009

On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Optical Fault Attacks on AES: A Threat in Violet.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

Contact-based fault injections and power analysis on RFID tags.
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009

Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags.
Proceedings of the Topics in Cryptology, 2009

2008
Susceptibility of UHF RFID Tags to Electromagnetic Analysis.
Proceedings of the Topics in Cryptology, 2008

RFID and Its Vulnerability to Faults.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008


  Loading...