The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stefan Tillich: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stefan Tillich, Johann Großschädl
    A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2m). [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2004, pp:282-295 [Conf]
  2. Johann Großschädl, Alexander Szekely, Stefan Tillich
    The energy cost of cryptographic key establishment in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:380-382 [Conf]
  3. Johann Großschädl, Roberto Maria Avanzi, Erkay Savas, Stefan Tillich
    Energy-Efficient Software Implementation of Long Integer Modular Arithmetic. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:75-90 [Conf]
  4. Stefan Tillich, Johann Großschädl
    Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:270-284 [Conf]
  5. Manuel Koschuch, Joachim Lechner, Andreas Weitzer, Johann Großschädl, Alexander Szekely, Stefan Tillich, Johannes Wolkerstorfer
    Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:430-444 [Conf]
  6. Stefan Tillich, Johann Großschädl, Alexander Szekely
    An Instruction Set Extension for Fast and Memory-Efficient AES Implementation. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:11-21 [Conf]
  7. Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich
    Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:192-207 [Conf]
  8. Johann Großschädl, Paolo Ienne, Laura Pozzi, Stefan Tillich, Ajay K. Verma
    Combining algorithm exploration with instruction set design: a case study in elliptic curve cryptography. [Citation Graph (0, 0)][DBLP]
    DATE, 2006, pp:218-223 [Conf]
  9. Stefan Tillich, Johann Großschädl
    Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:665-675 [Conf]
  10. Stefan Tillich, Johann Großschädl
    A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2004, pp:935-944 [Conf]
  11. Stefan Tillich, Martin Feldhofer, Johann Großschädl
    Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box. [Citation Graph (0, 0)][DBLP]
    SAMOS, 2006, pp:457-466 [Conf]
  12. Johann Großschädl, Karl C. Posch, Stefan Tillich
    Architectural Enhancements to Support Digital Signal Processing and Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    WISES, 2004, pp:129-143 [Conf]
  13. Stefan Tillich, Christoph Herbst, Stefan Mangard
    Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:141-157 [Conf]
  14. Stefan Tillich, Johann Großschädl
    Power Analysis Resistant AES Implementation with Instruction Set Extensions. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:303-319 [Conf]
  15. Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann, Marcel Medwed
    Energy evaluation of software implementations of block ciphers under memory constraints. [Citation Graph (0, 0)][DBLP]
    DATE, 2007, pp:1110-1115 [Conf]
  16. Stefan Tillich, Johann Großschädl
    VLSI Implementation of a Functional Unit to Accelerate ECC and AES on 32-Bit Processors. [Citation Graph (0, 0)][DBLP]
    WAIFI, 2007, pp:40-54 [Conf]

  17. On the Security of Untrusted Memory. [Citation Graph (, )][DBLP]


  18. Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. [Citation Graph (, )][DBLP]


  19. Boosting AES Performance on a Tiny Processor Core. [Citation Graph (, )][DBLP]


  20. Performance Evaluation of Instruction Set Extensions for Long Integer Modular Arithmetic on a SPARC V8 Processor. [Citation Graph (, )][DBLP]


  21. General security concept for embedded P2P systems. [Citation Graph (, )][DBLP]


  22. Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes. [Citation Graph (, )][DBLP]


  23. Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


Search in 0.032secs, Finished in 0.033secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002