Georg Sigl
Orcid: 0000-0003-3152-941XAffiliations:
- Technical University Munich, Germany
According to our database1,
Georg Sigl
authored at least 162 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography.
J. Cryptogr. Eng., April, 2024
ACM Trans. Embed. Comput. Syst., March, 2024
A Masked Hardware Accelerator for Feed-Forward Neural Networks With Fixed-Point Arithmetic.
IEEE Trans. Very Large Scale Integr. Syst., February, 2024
Proceedings of the 2024 IEEE Nordic Circuits and Systems Conference (NorCAS), 2024
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
Switch-Glitch : Location of Fault Injection Sweet Spots by Electro-Magnetic Emanation.
Proceedings of the Workshop on Fault Detection and Tolerance in Cryptography, 2024
Proceedings of the 27th International Symposium on Design & Diagnostics of Electronic Circuits & Systems, 2024
Proceedings of the 27th International Symposium on Design & Diagnostics of Electronic Circuits & Systems, 2024
EMDRIVE Architecture: Embedded Distributed Computing and Diagnostics from Sensor to Edge.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
A Lightweight Firmware Resilience Engine for IoT Devices Leveraging Minimal Processor Features.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
IACR Cryptol. ePrint Arch., 2023
The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the IEEE European Test Symposium, 2023
Proceedings of the 28th Asia and South Pacific Design Automation Conference, 2023
2022
ROPAD: Enhancing the Digital Ring Oscillator Probing Attempt Detector for Protecting Irregular Data Buses.
IEEE Trans. Very Large Scale Integr. Syst., 2022
ACM Trans. Reconfigurable Technol. Syst., 2022
ACM Trans. Design Autom. Electr. Syst., 2022
On the application of Two-Photon Absorption for Laser Fault Injection attacks Pushing the physical boundaries for Laser-based Fault Injection.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC.
J. Cryptogr. Eng., 2022
A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022
Proceedings of the 25th Euromicro Conference on Digital System Design, 2022
Proceedings of the 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems, 2022
Golden Model-Free Hardware Trojan Detection by Classification of Netlist Module Graphs.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2022
2021
Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA.
IEEE Trans. Inf. Forensics Secur., 2021
DOMREP-An Orthogonal Countermeasure for Arbitrary Order Side-Channel and Fault Attack Protection.
IEEE Trans. Inf. Forensics Secur., 2021
Beyond Cache Attacks: Exploiting the Bus-based Communication Structure for Powerful On-Chip Microarchitectural Attacks.
ACM Trans. Embed. Comput. Syst., 2021
Proceedings of the 18th Workshop on Fault Detection and Tolerance in Cryptography, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Tapeout of a RISC-V crypto chip with hardware trojans: a case-study on trojan design and pre-silicon detectability.
Proceedings of the CF '21: Computing Frontiers Conference, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
J. Cryptogr. Eng., 2020
Integr., 2020
IACR Cryptol. ePrint Arch., 2020
TimingCamouflage+: Netlist Security Enhancement with Unconventional Timing (with Appendix).
CoRR, 2020
Secure and user-friendly over-the-air firmware distribution in a portable faraday cage.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the 2020 IEEE Computer Society Annual Symposium on VLSI, 2020
Efficient Hardware/Software Co-Design for Post-Quantum Crypto Algorithm SIKE on ARM and RISC-V based Microcontrollers.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2020
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020
Extending the RISC-V Instruction Set for Hardware Acceleration of the Post-Quantum Scheme LAC.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020
2019
IEEE Trans. Very Large Scale Integr. Syst., 2019
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
CoRR, 2019
Proceedings of the 8th Mediterranean Conference on Embedded Computing, 2019
Using Hardware Software Codesign for Optimised Implementations of High-Speed and Defence in Depth CAESAR Finalists.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2019
Improving on State Register Identification in Sequential Hardware Reverse Engineering.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2019
EyeSec: A Retrofittable Augmented Reality Tool for Troubleshooting Wireless Sensor Networks in the Field.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019
Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2019
2018
IEEE Trans. Very Large Scale Integr. Syst., 2018
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction.
IACR Cryptol. ePrint Arch., 2018
18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices.
IACR Cryptol. ePrint Arch., 2018
DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 International Conference on ReConFigurable Computing and FPGAs, 2018
Proceedings of the 7th Mediterranean Conference on Embedded Computing, 2018
The CAESAR-API in the real world - Towards a fair evaluation of hardware CAESAR candidates.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
Dividing the threshold: Multi-probe localized EM analysis on threshold implementations.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
Locked out by Latch-up? An Empirical Study on Laser Fault Injection into Arm Cortex-M Processors.
Proceedings of the 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2018
Proceedings of the 23rd IEEE European Test Symposium, 2018
Where Technology Meets Security: Key Storage and Data Separation for System-on-Chips.
Proceedings of the 44th IEEE European Solid State Circuits Conference, 2018
Proceedings of the 55th Annual Design Automation Conference, 2018
2017
Efficient security zones implementation through hierarchical group key management at NoC-based MPSoCs.
Microprocess. Microsystems, 2017
Microprocess. Microsystems, 2017
Microprocess. Microsystems, 2017
Microprocess. Microsystems, 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IFIP/IEEE International Conference on Very Large Scale Integration, 2017
Proceedings of the 30th IEEE International System-on-Chip Conference, 2017
A security-aware routing implementation for dynamic data protection in zone-based MPSoC.
Proceedings of the 30th Symposium on Integrated Circuits and Systems Design: Chip on the Sands, 2017
Towards trace-driven cache attacks on Systems-on-Chips - exploiting bus communication.
Proceedings of the 12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip, 2017
Proceedings of the 2017 IEEE Computer Society Annual Symposium on VLSI, 2017
Towards Protected MPSoC Communication for Information Protection against a Malicious NoC.
Proceedings of the International Conference on Computational Science, 2017
Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
J. Circuits Syst. Comput., 2016
IACR Cryptol. ePrint Arch., 2016
EURASIP J. Inf. Secur., 2016
Proceedings of the 29th Symposium on Integrated Circuits and Systems Design, 2016
Proceedings of the 29th Symposium on Integrated Circuits and Systems Design, 2016
Proceedings of the 11th International Symposium on Reconfigurable Communication-centric Systems-on-Chip, 2016
Proceedings of the 1st IEEE International Verification and Security Workshop, 2016
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
Practical Aspects of Quantization and Tamper-Sensitivity for Physically Obfuscated Keys.
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016
Enhancing Fault Emulation of Transient Faults by Separating Combinational and Sequential Fault Propagation.
Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 2016
Towards Side-Channel Secure Firmware Updates - A Minimalist Anomaly Detection Approach.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 2016 Euromicro Conference on Digital System Design, 2016
Proceedings of the 2016 Euromicro Conference on Digital System Design, 2016
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
Hiding Higher-Order Univariate Leakages by Shuffling Polynomial Masking Schemes: A More Efficient, Shuffled, and Higher-Order Masked AES S-box.
Proceedings of the ACM Workshop on Theory of Implementation Security, 2016
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016
Proceedings of the Smart Card Research and Advanced Applications, 2016
Proceedings of the Smart Card Research and Advanced Applications, 2016
2015
Closing the gap between speed and configurability of multi-bit fault emulation environments for security and safety-critical designs.
Microprocess. Microsystems, 2015
Fehlerkorrekturverfahren zur sicheren Schlüsselerzeugung mit Physical Unclonable Functions.
Datenschutz und Datensicherheit, 2015
Using the reconfigurability of modern FPGAs for highly efficient PUF-based key generation.
Proceedings of the 10th International Symposium on Reconfigurable Communication-centric Systems-on-Chip, 2015
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2015
Proceedings of the 2015 IEEE Computer Society Annual Symposium on VLSI, 2015
Proceedings of the 2015 Euromicro Conference on Digital System Design, 2015
Improving Non-profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-channel High-Resolution EM Measurements.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015
Side Channel Attacks on Smartphones and Embedded Devices Using Standard Radio Equipment.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015
Proceedings of the Smart Card Research and Advanced Applications, 2015
seTPM: Towards Flexible Trusted Computing on Mobile Devices Based on GlobalPlatform Secure Elements.
Proceedings of the Smart Card Research and Advanced Applications, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Error Correction for Physical Unclonable Functions Using Generalized Concatenated Codes.
CoRR, 2014
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014
Investigating measurement methods for high-resolution electromagnetic field side-channel analysis.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014
On Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded Systems.
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014
Closing the Gap between Speed and Configurability of Multi-bit Fault Emulation Environments for Security and Safety-Critical Designs.
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
Proceedings of the 9th Workshop on Embedded Systems Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC), 2013
Proceedings of the 2013 IEEE International Test Conference, 2013
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013
Proceedings of the Design, Automation and Test in Europe, 2013
Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes.
Proceedings of the TrustED'13, 2013
Proceedings of the Number Theory and Cryptography, 2013
2012
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis.
Proceedings of the Smart Card Research and Advanced Applications, 2012
Proceedings of the 2012 NASA/ESA Conference on Adaptive Hardware and Systems, 2012
2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Proceedings of the 2011 IEEE/ACM International Conference on Computer-Aided Design, 2011
Proceedings of the 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2011
1992
Forschungsberichte, TU Munich, 1992
Plazierung der Zellen bei der Layoutsynthese mittels Partitionierung und quadratischer Optimierung.
PhD thesis, 1992
Proceedings of the 1992 IEEE/ACM International Conference on Computer-Aided Design, 1992
Proceedings of the conference on European design automation, 1992
1991
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1991
DOMINO: Deterministic Placement Improvement with Hill-Climbing Capabilities.
Proceedings of the VLSI 91, 1991
Proceedings of the 1991 IEEE/ACM International Conference on Computer-Aided Design, 1991
Proceedings of the conference on European design automation, 1991
Proceedings of the 28th Design Automation Conference, 1991
1988
Proceedings of the 1988 IEEE International Conference on Computer-Aided Design, 1988