Search the dblp DataBase
Stefan Tillich :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Stefan Tillich , Johann Großschädl A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2m ). [Citation Graph (0, 0)][DBLP ] Asia-Pacific Computer Systems Architecture Conference, 2004, pp:282-295 [Conf ] Johann Großschädl , Alexander Szekely , Stefan Tillich The energy cost of cryptographic key establishment in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:380-382 [Conf ] Johann Großschädl , Roberto Maria Avanzi , Erkay Savas , Stefan Tillich Energy-Efficient Software Implementation of Long Integer Modular Arithmetic. [Citation Graph (0, 0)][DBLP ] CHES, 2005, pp:75-90 [Conf ] Stefan Tillich , Johann Großschädl Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors. [Citation Graph (0, 0)][DBLP ] CHES, 2006, pp:270-284 [Conf ] Manuel Koschuch , Joachim Lechner , Andreas Weitzer , Johann Großschädl , Alexander Szekely , Stefan Tillich , Johannes Wolkerstorfer Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller. [Citation Graph (0, 0)][DBLP ] CHES, 2006, pp:430-444 [Conf ] Stefan Tillich , Johann Großschädl , Alexander Szekely An Instruction Set Extension for Fast and Memory-Efficient AES Implementation. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:11-21 [Conf ] Elisabeth Oswald , Stefan Mangard , Christoph Herbst , Stefan Tillich Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:192-207 [Conf ] Johann Großschädl , Paolo Ienne , Laura Pozzi , Stefan Tillich , Ajay K. Verma Combining algorithm exploration with instruction set design: a case study in elliptic curve cryptography. [Citation Graph (0, 0)][DBLP ] DATE, 2006, pp:218-223 [Conf ] Stefan Tillich , Johann Großschädl Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:665-675 [Conf ] Stefan Tillich , Johann Großschädl A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices. [Citation Graph (0, 0)][DBLP ] ISCIS, 2004, pp:935-944 [Conf ] Stefan Tillich , Martin Feldhofer , Johann Großschädl Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box. [Citation Graph (0, 0)][DBLP ] SAMOS, 2006, pp:457-466 [Conf ] Johann Großschädl , Karl C. Posch , Stefan Tillich Architectural Enhancements to Support Digital Signal Processing and Public-Key Cryptography. [Citation Graph (0, 0)][DBLP ] WISES, 2004, pp:129-143 [Conf ] Stefan Tillich , Christoph Herbst , Stefan Mangard Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:141-157 [Conf ] Stefan Tillich , Johann Großschädl Power Analysis Resistant AES Implementation with Instruction Set Extensions. [Citation Graph (0, 0)][DBLP ] CHES, 2007, pp:303-319 [Conf ] Johann Großschädl , Stefan Tillich , Christian Rechberger , Michael Hofmann , Marcel Medwed Energy evaluation of software implementations of block ciphers under memory constraints. [Citation Graph (0, 0)][DBLP ] DATE, 2007, pp:1110-1115 [Conf ] Stefan Tillich , Johann Großschädl VLSI Implementation of a Functional Unit to Accelerate ECC and AES on 32-Bit Processors. [Citation Graph (0, 0)][DBLP ] WAIFI, 2007, pp:40-54 [Conf ] On the Security of Untrusted Memory. [Citation Graph (, )][DBLP ] Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. [Citation Graph (, )][DBLP ] Boosting AES Performance on a Tiny Processor Core. [Citation Graph (, )][DBLP ] Performance Evaluation of Instruction Set Extensions for Long Integer Modular Arithmetic on a SPARC V8 Processor. [Citation Graph (, )][DBLP ] General security concept for embedded P2P systems. [Citation Graph (, )][DBLP ] Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes. [Citation Graph (, )][DBLP ] Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Search in 0.032secs, Finished in 0.033secs