Sebastian Kutzner

According to our database1, Sebastian Kutzner authored at least 9 papers between 2012 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
On the Security of RSM - Presenting 5 First- and Second-Order Attacks.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

Minimizing S-Boxes in Hardware by Utilizing Linear Transformations.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

TROJANUS: An ultra-lightweight side-channel leakage generator for FPGAs.
Proceedings of the 2013 International Conference on Field-Programmable Technology, 2013

Hardware trojan design and detection: a practical evaluation.
Proceedings of the Workshop on Embedded Systems Security, 2013

2012
On 3-share Threshold Implementations for 4-bit S-boxes.
IACR Cryptol. ePrint Arch., 2012

Enabling 3-share Threshold Implementations for any 4-bit S-box.
IACR Cryptol. ePrint Arch., 2012

Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU.
Proceedings of the Advances in Information and Computer Security, 2012


  Loading...