[1]
D. V. Bailey
u. a., „The certicom challenges ECC2-X“, gehalten auf der SHARCS’09 - Special-purpose Hardware for Attacking Cryptographic Systems, Lausanne, 9. September 2009,
Publiziert. [Online]. Verfügbar unter:
http://cr.yp.to/talks/2009.09.09/slides.pdf
[2]
T. Kasper, D. Oswald, und C. Paar, „New methods for cost-effective side-channel attacks on cryptographic RFIDs“, 30. Juni 2009, Publiziert.
[3]
M. Vogt, A. Y. Poschmann, und C. Paar, „Cryptography is feasible on 4-bit microcontrollers - a proof of concept“, in
2009 IEEE international conference on RFID (IEEE RFID) : Orlando, Florida, USA, 27 - 28 April 2009, 2009, S. 233–240. doi:
10.1109/rfid.2009.4911182.
[4]
M. Sbeiti, M. Silbermann, A. Y. Poschmann, und C. Paar, „Design space exploration of present implementations for FPGAS“, in
2009 5th Southern Conference on Programmable Logic, 2009, S. 141–145. doi:
10.1109/spl.2009.4914893.
[5]
T. Kasper, D. Oswald, und C. Paar, „EM side-channel attacks on commercial contactless smartcards using low-cost equipment“, in
Information security applications, 2009, Bd. 5932, S. 79–93. doi:
10.1007/978-3-642-10838-9_7.
[6]
A. Moradi, N. Mousavi, C. Paar, und M. Salmasizadeh, „A comparative study of mutual information analysis under a Gaussian assumption“, in
Information security applications, 2009, Bd. 5932, S. 193–205. doi:
10.1007/978-3-642-10838-9_15.
[7]
C. Paar, „Crypto Engineering: some history and some case studies“, in
Cryptographic hardware and embedded systems - CHES 2009, Lausanne, 2009, Bd. 5747, S. 220–224. doi:
10.1007/978-3-642-04138-9_16.
[8]
A. Y. Poschmann, C. Paar, und M. J. B. Robshaw, „Lightweight cryptography: cryptographic engineering for a pervasive world“, Europ. Univ. Verlag, Berlin, 2009.
[9]
C. Paar, T. Eisenbarth, M. Kasper, T. Kasper, und A. Moradi, „KeeLoq and side-channel analysis: evolution of an attack“, in
Workshop on fault diagnosis and tolerance in cryptography (FDTC), 2009, 2009, S. 65–69. doi:
10.1109/fdtc.2009.44.
[10]
F. Regazzoni
u. a., „Evaluating resistance of MCML technology to power analysis attacks using a simulation-based methodology“, in
Transactions on computational science IV, 2009, Bd. 5430, S. 230–243. doi:
10.1007/978-3-642-01004-0_13.
[11]
T. Eisenbarth, T. Güneysu, S. Heyse, und C. Paar, „MicroEliece: McEliece for embedded devices“, in
Cryptographic hardware and embedded systems - CHES 2009, Lausanne, 2009, Bd. 5747, S. 49–64. doi:
10.1007/978-3-642-04138-9_4.
[12]
L. Lin, M. Kasper, T. Güneysu, C. Paar, und W. Burleson, „Trojan side-channels: lightweight hardware trojans through side-channel engineering“, in
Cryptographic hardware and embedded systems - CHES 2009, Lausanne, 2009, Bd. 5747, S. 382–395. doi:
10.1007/978-3-642-04138-9_27.
[13]
J. Guajardo Merchan, T. Güneysu, S. S. Kumar, und C. Paar, „Secure IP-block distribution for hardware devices“, in
2009 IEEE international workshop on hardware-oriented security and trust, 2009, S. 82–89. doi:
10.1109/hst.2009.5224965.
[14]
A. Y. Poschmann, N.-G. Leander, K. Schramm, und C. Paar, „A family of light-weight block ciphers based on DES suited for RFID applications“, 2009.
[15]
G. T. Becker, S. C. Lo, D. S. de Lorenzo, D. Qiu, C. Paar, und P. K. Enge, „Efficient authentication mechanisms for navigation systems - a radio-navigation case study“, in Proceedings fo the 22nd international technical meeting of the Satellite Division of the Institute of Navigation, ION GNSS 2009 : Sept. 22 - 25, 2009, Savanna Convention Center, Savannah, Georgia, 2009, S. 901–912.
[16]
L. Lin, W. P. Burleson, und C. Paar, „MOLES: malicious off-chip leakage enabled by side-channels“, in
2009 IEEE/ACM International Conference on Computer-Aided Design digest of technical papers, 2009, S. 117–122. [Online]. Verfügbar unter:
http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=5361303
[17]
M. Kasper, T. Kasper, A. Moradi, und C. Paar, „Breaking KEELOQ in a flash: on extracting keys at lightning speed“, in
Progress in cryptology - Africacrypt <2, 2009, Gammarth>, Bd. 5580, B. Preneel, Hrsg. Berlin: Springer, 2009, S. 403–420. doi:
10.1007/978-3-642-02384-2_25.
[18]
D. V. Bailey, J. Brainard, S. Rohde, und C. Paar, „One-touch financial transaction authentication“, in
Proceedings of the international conference on security and cryptography, 2009, S. 5–12. doi:
10.5220/0002182400050012.
[19]
J. Guajardo Merchan, T. Güneysu, S. S. Kumar, und C. Paar, 2009 IEEE international workshop on hardware-oriented security and trust: HOST ’09 ; San Francisco, California, USA, 27 July 2009. Piscataway, NJ: IEEE, 2009.
[20]
T. Güneysu, G. Pfeiffer, C. Paar, und M. Schimmler, „Three years of evolution: cryptanalysis with Copacobana“, 2009.
[22]
C. Paar, A. Rupp, K. Schramm, A. Weimerskirch, und W. Burleson, „Securing green cars: IT security in next-generation electric vehicle systems“, 2009.
[24]
A. Moradi, N. Mousavi, C. Paar, und M. Salmasizadeh, „A comparative study of mutual information analysis under a Gaussian assumption“, 2009.
[25]
M. Kasper, T. Kasper, A. Moradi, und C. Paar, „Breaking KEELOQ in a flash: on extracting keys at lightning speed“, 2009.
[26]
C. Paar, „Crypto engineering: some history and some case studies“, 2009.
[27]
M. Vogt, A. Y. Poschmann, und C. Paar, „Cryptography is feasible on 4-bit microcontrollers - a proof of concept“, 2009.
[28]
M. Sbeiti, M. Silbermann, A. Y. Poschmann, und C. Paar, „Design space exploration of present implementations for FPGAS“, 2009.
[29]
T. Kasper, D. Oswald, und C. Paar, „EM side-channel attacks on commercial contactless smartcards using low-cost equipment“, 2009.
[30]
F. Regazzoni u. a., „Evaluating resistance of MCML technology to power analysis attacks using a simulation-based methodology“, 2009.
[31]
C. Paar, T. Eisenbarth, M. Kasper, T. Kasper, und A. Moradi, „KeeLoq and side-channel analysis: evolution of an attack“, 2009.
[32]
T. Eisenbarth, T. Güneysu, S. Heyse, und C. Paar, „MicroEliece: McEliece for embedded devices“, 2009.
[33]
D. V. Bailey, J. Brainard, S. Rohde, und C. Paar, „One-touch financial transaction authentication“, 2009.
[34]
A. Moradi, T. Eisenbarth, A. Y. Poschmann, und C. Paar, „Power analysis of single-rail storage elements as used in MDPL“, 2009.
[35]
J. Guajardo Merchan, T. Güneysu, S. S. Kumar, und C. Paar, „Secure IP-block distribution for hardware devices“, 2009.
[36]
L. Lin, M. Kasper, T. Güneysu, C. Paar, und W. Burleson, „Trojan side-channels: lightweight hardware trojans through side-channel engineering“, Poster-Abstract, 2009.