Author of the publication

LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security.

, , , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (4): 412-446 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stealing Maggie's Secrets - On the Challenges of IP Theft Through FPGA Reverse Engineering., , , , , , , , , and 2 other author(s). CoRR, (2023)A survey of algorithmic methods in IC reverse engineering., , , , , and . IACR Cryptol. ePrint Arch., (2021)LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security., , , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (4): 412-446 (2021)Evaluation of Lattice-Based Signature Schemes in Embedded Systems., , , and . ICECS, page 385-388. IEEE, (2018)How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations., , , , , and . SP, page 1656-1671. IEEE, (2022)Expanding Explainability: From Explainable Artificial Intelligence to Explainable Hardware., , , , , and . CoRR, (2023)Towards Practical Microcontroller Implementation of the Signature Scheme Falcon., , , and . PQCrypto, volume 11505 of Lecture Notes in Computer Science, page 65-80. Springer, (2019)Hardware-Trojaner., , , , and . Datenschutz und Datensicherheit, 44 (7): 446-450 (2020)Evil from Within: Machine Learning Backdoors through Hardware Trojans., , , , and . CoRR, (2023)How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations., , , , , and . CoRR, (2021)