Jorge Guajardo

Orcid: 0000-0002-2478-7691

Affiliations:
  • Robert Bosch Research and Technology Center, Germany


According to our database1, Jorge Guajardo authored at least 79 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Client-Efficient Online-Offline Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2024

Towards a New Configurable and Practical Remote Automotive Security Testing Platform.
CoRR, 2024

Work-in-Progress: CANGen: Practical Synthetic CAN Traces Generation Using Deep Generative Models.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

Work-in-Progress: Towards a New Configurable and Practical Remote Automotive Security Testing Platform.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

PHIDIAS: Power Signature Host-based Intrusion Detection in Automotive Microcontrollers.
Proceedings of the 2024 Workshop on Attacks and Solutions in Hardware Security, 2024

2023
MUSES: Efficient Multi-User Searchable Encrypted Database.
IACR Cryptol. ePrint Arch., 2023

CMP-SiL: Confidential Multi Party Software-in-the-Loop Simulation Frameworks.
Proceedings of the 24th International Symposium on Quality Electronic Design, 2023

2022
Titanium: A Metadata-Hiding File-Sharing System with Malicious Security.
IACR Cryptol. ePrint Arch., 2022

2021
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services.
IEEE Trans. Serv. Comput., 2021

CANNON: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Improving the Efficiency of AES Protocols in Multi-Party Computation.
Proceedings of the Financial Cryptography and Data Security, 2021

2020
A Multi-server ORAM Framework with Constant Client Bandwidth Blowup.
ACM Trans. Priv. Secur., 2020

On the feasibility of deriving cryptographic keys from MEMS sensors.
J. Cryptogr. Eng., 2020

MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework.
IACR Cryptol. ePrint Arch., 2020

Grand Challenges for Embedded Security Research in a Connected World.
CoRR, 2020

2019
A multi-server oblivious dynamic searchable encryption framework.
J. Comput. Secur., 2019

2018
Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks (Extended Version).
CoRR, 2018

Revisiting Private Stream Aggregation: Lattice-Based PSA.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

ASHES 2018- Workshop on Attacks and Solutions in Hardware Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2018

2017
A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services.
IACR Cryptol. ePrint Arch., 2017

Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM.
IACR Cryptol. ePrint Arch., 2017

S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing.
IACR Cryptol. ePrint Arch., 2017

Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things.
IEEE Access, 2017

SOMAR: Privacy-Preserving SOcial Media Advertising ARchitecture.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

LWE-based lossless computational fuzzy extractor for the Internet of Things.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Towards a new privacy-preserving social media advertising architecture (invited position paper).
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

S<sup>3</sup>ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
MEMS-based Gyroscopes as Physical Unclonable Functions.
IACR Cryptol. ePrint Arch., 2016

Physical Layer Group Key Agreement for Automotive Controller Area Networks.
IACR Cryptol. ePrint Arch., 2016

Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT.
IACR Cryptol. ePrint Arch., 2016

Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

MEMS Gyroscopes as Physical Unclonable Functions.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Practical and secure dynamic searchable encryption via oblivious access on distributed data structure.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware.
IACR Cryptol. ePrint Arch., 2015

Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015).
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014).
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference.
Proceedings of the Financial Cryptography and Data Security, 2013

OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Privacy preserving ECG quality evaluation.
Proceedings of the Multimedia and Security Workshop, 2012

2011
Physical Unclonable Functions (PUFs).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Itoh-Tsujii Inversion Algorithm.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Towards Reliable Remote Healthcare Applications Using Combined Fuzzy Extraction.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
IACR Cryptol. ePrint Arch., 2010

Efficient strategies to play the indistinguishability game for fuzzy sketches.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Privacy preserving evaluation of signal quality with application to ECG analysis.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

On Side-Channel Resistant Block Cipher Usage.
Proceedings of the Information Security - 13th International Conference, 2010

Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Anonymous Credential Schemes with Encrypted Attributes.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions.
Inf. Syst. Frontiers, 2009

Physical Unclonable Functions and Their Applications to Vehicle System Security.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

Privacy-Preserving Face Recognition.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

Secure IP-Block Distribution for Hardware Devices.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware.
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009

09282 Executive Summary - Foundations for Forgery-Resilient Cryptographic Hardware.
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009

2008
Brand and IP protection with physical unclonable functions.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

The Butterfly PUF: Protecting IP on every FPGA.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008

Efficient Helper Data Key Extractor on FPGAs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

2007
Public-Key Cryptography for RFID-Tags.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays.
Proceedings of the ISSE/SECURE 2007, 2007

Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection.
Proceedings of the FPL 2007, 2007

ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

FPGA Intrinsic PUFs and Their Use for IP Protection.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

2006
An Elliptic Curve Processor Suitable For RFID-Tags.
IACR Cryptol. ePrint Arch., 2006

2005
Itoh-Tsujii Inversion Algorithm.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2004
Arithmetic architectures for finite fields GF(pm) with cryptographic applications.
PhD thesis, 2004

Security on FPGAs: State-of-the-art implementations and attacks.
ACM Trans. Embed. Comput. Syst., 2004

Provably Secure Masking of AES.
IACR Cryptol. ePrint Arch., 2004

2003
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update).
IACR Cryptol. ePrint Arch., 2003

Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p<sup>m</sup>).
Proceedings of the Progress in Cryptology, 2003

Efficient GF(p<sup>m</sup>) Arithmetic Architectures for Cryptographic Applications.
Proceedings of the Topics in Cryptology, 2003

Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2002
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes.
Des. Codes Cryptogr., 2002

RSA Key Generation with Verifiable Randomness.
Proceedings of the Public Key Cryptography, 2002

2001
Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers.
Proceedings of the Public Key Cryptography, 2001

2000
How Well Are High-End DSPs Suited for the AES Algorithms? AES Algorithms on the TMS320C6x DSP.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1997
Efficient Algorithms for Elliptic Curve Cryptosystems.
Proceedings of the Advances in Cryptology, 1997


  Loading...