Michael Hutter
Orcid: 0000-0001-9769-7649
According to our database1,
Michael Hutter
authored at least 54 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Commun. Cryptol., 2024
Proceedings of the 2024 Workshop on Attacks and Solutions in Hardware Security, 2024
2021
Proceedings of the 26th IEEE European Test Symposium, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.
J. Cryptol., 2020
2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
2018
Protecting Triple-DES Against DPA - A Practical Application of Domain-Oriented Masking.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018
2017
IACR Cryptol. ePrint Arch., 2017
2016
Proceedings of the ACM Workshop on Theory of Implementation Security, 2016
2015
Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness.
IEEE Trans. Inf. Forensics Secur., 2015
Des. Codes Cryptogr., 2015
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015
2014
Using Bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA: extended version.
J. Cryptogr. Eng., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
PIONEER - a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
Proceedings of the IEEE International Conference on RFID, 2014
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014
2013
Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography.
IEEE Trans. Very Large Scale Integr. Syst., 2013
IACR Cryptol. ePrint Arch., 2013
Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA.
IACR Cryptol. ePrint Arch., 2013
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC.
Proceedings of the HASP 2013, 2013
2012
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
An approach to introducing locality in remote attestation using near field communications.
J. Supercomput., 2011
A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011
Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations.
Proceedings of the Information Security Technology for Applications, 2011
Proceedings of the Smart Card Research and Advanced Applications, 2011
Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-<i>Z</i> Coordinate Representation.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
Int. J. Secur. Networks, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the Smart Card Research and Advanced Application, 2010
2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
RFID Authentication Protocols based on Elliptic Curves - A Top-Down Evaluation Survey.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the Integrated Network Management, 2009
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Proceedings of the 19th IEEE International Conference on Application-Specific Systems, 2008
2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
1992
Selbstorganisation in sozialen Systemen - Eine Theorie und ihre Anwendung auf Wirtschaftssysteme.
Proceedings of the Aspekte der Selbstorganisation, 1992