Thomas Pöppelmann
Affiliations:- Infineon Technologies AG, Germany
According to our database1,
Thomas Pöppelmann
authored at least 38 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography.
J. Cryptogr. Eng., April, 2024
2023
IEEE Trans. Computers, April, 2023
IACR Cryptol. ePrint Arch., 2023
Secure and Efficient Post-Quantum Cryptography in Hardware and Software (Dagstuhl Seminar 23152).
Dagstuhl Reports, 2023
2022
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
2019
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
2017
ACM Trans. Embed. Comput. Syst., 2017
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017
Proceedings of the Computing Frontiers Conference, 2017
2016
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016
2015
ACM Trans. Embed. Comput. Syst., 2015
Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware.
IEEE Trans. Computers, 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015
2014
IACR Cryptol. ePrint Arch., 2014
A hardware-assisted proof-of-concept for secure VoIP clients on untrusted operating systems.
Proceedings of the 2014 International Conference on ReConFigurable Computing and FPGAs, 2014
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
Area optimization of lightweight lattice-based encryption on reconfigurable hardware.
Proceedings of the IEEE International Symposium on Circuits and Systemss, 2014
Proceedings of the 51st Annual Design Automation Conference 2014, 2014
Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms.
Proceedings of the Cryptography and Information Security in the Balkans, 2014
2013
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
2012
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 2012 International Conference on Reconfigurable Computing and FPGAs, 2012
Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010