Jorge Guajardo
Affiliations:- Robert Bosch Research and Technology Center, Germany
According to our database1,
Jorge Guajardo
authored at least 78 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Towards a New Configurable and Practical Remote Automotive Security Testing Platform.
CoRR, 2024
Work-in-Progress: CANGen: Practical Synthetic CAN Traces Generation Using Deep Generative Models.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Work-in-Progress: Towards a New Configurable and Practical Remote Automotive Security Testing Platform.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 24th International Symposium on Quality Electronic Design, 2023
2022
IACR Cryptol. ePrint Arch., 2022
2021
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services.
IEEE Trans. Serv. Comput., 2021
CANNON: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
2020
ACM Trans. Priv. Secur., 2020
J. Cryptogr. Eng., 2020
IACR Cryptol. ePrint Arch., 2020
2019
J. Comput. Secur., 2019
2018
Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks (Extended Version).
CoRR, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2018
2017
A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing.
IACR Cryptol. ePrint Arch., 2017
Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things.
IEEE Access, 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Towards a new privacy-preserving social media advertising architecture (invited position paper).
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
S<sup>3</sup>ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Practical and secure dynamic searchable encryption via oblivious access on distributed data structure.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the Multimedia and Security Workshop, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
2009
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions.
Inf. Syst. Frontiers, 2009
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware.
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009
2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the ISSE/SECURE 2007, 2007
Proceedings of the FPL 2007, 2007
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
2004
PhD thesis, 2004
ACM Trans. Embed. Comput. Syst., 2004
2003
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update).
IACR Cryptol. ePrint Arch., 2003
Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p<sup>m</sup>).
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Topics in Cryptology, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
2002
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes.
Des. Codes Cryptogr., 2002
Proceedings of the Public Key Cryptography, 2002
2001
Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers.
Proceedings of the Public Key Cryptography, 2001
2000
How Well Are High-End DSPs Suited for the AES Algorithms? AES Algorithms on the TMS320C6x DSP.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
1997
Proceedings of the Advances in Cryptology, 1997