HOME | KONTAKT

Logo Universität Bremen
LOGO AGRA | AG Rechnerarchitektur



Arbeitsgruppe Rechnerarchitektur / AGRA | Informatik | FB03 | Universität Bremen

Prof. Dr.-Ing. Tim Güneysu


Ich leite seit Oktober 2015 die Arbeitsgruppe Technische Informatik/IT-Sicherheit als Brückenprofessur mit dem Deutschen Forschungszentrum für Künstliche Intelligenz (DFKI) mit dem Forschungsschwerpunkt im Bereich der eingebetteten Sicherheit.

Leitung

Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016
Autor: Edgar E. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Xinxin Fan, Tim Güneysu
Verlag: ACM
Format: (2016)

Lightweight Cryptography for Security and Privacy - 4th International Workshop (LightSec 2015)
Autor: Tim Güneysu, Gregor Leander, Amir Moradi (Eds.)
Verlag: Springer
Format: Softcover, eBook (2016)

Cryptographic Hardware and Embedded Systems (CHES 2015)
Autor: Tim Güneysu, Helena Handschuh (Eds.)
Verlag: Springer
Format: Softcover, eBook (2015)

Evaluation of (power) side-channels in cryptographic implementations
Autor: Florian Bache, Christina Plump, Jonas Wloka, Tim Güneysu, and Rolf Drechsler
Zeitschrift: it – Information Technology
Details: DOI: 10.1515/itit-2018-0028, Volume 61(1) (2019)

Information reconciliation schemes in physical-layer security: A survey
Autor: Christopher Huth, Rene Guillaume, Thomas Strohm, Paul Duplys, Irin Ann Samuel, Tim Güneysu
Zeitschrift: Computer Networks
Details: DOI: 10.1016/j.comnet.2016.06.014, 109: 84-104 (2016)

Nano Security: From Nano-Electronics to Secure Systems
Autor: Ilia Polian, Frank Altmann, Tolga Arul, Christian Boit, Ralf Brederlow, Lucas Davi, Rolf Drechsler, Nan Du, Thomas Eisenbarth, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock, Stefan Katzenbeisser, Akash Kumar, Wolfgang Kunz, Thomas Mikolajick, Vivek Pachauri, Jean-Pierre Seifert, Frank Sill Torres, Jens Trommer
Konferenz: Design, Automation and Test in Europe Conference (DATE)
Pdf | Referenz: Grenoble, France, 2021

Verification of Embedded Binaries using Coverage-guided Fuzzing with SystemC-based Virtual Prototypes
Autor: Vladimir Herdt, Daniel Große, Jonas Wloka, Tim Güneysu, Rolf Drechsler
Konferenz: 30th ACM Great Lakes Symposium on VLSI (GLSVLSI)
Pdf | Referenz: Beijing, China, 2020

Confident Leakage Assessment - A Side-Channel Evaluation Framework based on Confidence Intervals
Autor: Florian Bache, Christina Plump, Tim Güneysu
Konferenz: Design, Automation and Test in Europe (DATE)
Referenz: Dresden, Germany, 2018

Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware
Autor: Pascal Sasdrich, Amir Moradi, Tim Güneysu
Konferenz: RSA Conference Cryptographers’ Track (CT-RSA)
Pdf | Referenz: San Francisco, US, 2017.

White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
Autor: Pascal Sasdrich, Amir Moradi, Tim Güneysu
Konferenz: FSE 2016: 185-203
Referenz: http://dx.doi.org/10.1007/978-3-662-52993-5_10

Strong 8-bit Sboxes with Efficient Masking in Hardware
Autor: Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Konferenz: CHES 2016: 171-193
Referenz: http://dx.doi.org/10.1007/978-3-662-53140-2_9

ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
Autor: Tobias Schneider, Amir Moradi, Tim Güneysu
Konferenz: CRYPTO (2), Santa Barbara, USA, 2016: 302-332
Referenz: http://dx.doi.org/10.1007/978-3-662-53008-5_11

On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs.
Autor: Alexander Wild, Georg T. Becker, Tim Güneysu
Konferenz: Hardware-Oriented Security and Trust (HOST) 2016: 103-108
Referenz: http://dx.doi.org/10.1109/HST.2016.7495565

Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
Autor: Christopher Huth, Aydin Aysu, Jorge Guajardo, Paul Duplys, Tim Güneysu
Konferenz: ICISC 2016: 28-48
Referenz: http://dx.doi.org/10.1007/978-3-319-53177-9_2

High-Performance and Lightweight Lattice-Based Public-Key Encryption
Autor: Johannes A. Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann
Konferenz: IoTPTS@AsiaCCS 2016: 2-9
Referenz: http://doi.acm.org/10.1145/2899007.2899011

IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter
Autor: Ingo von Maurich, Lukas Heberle, Tim Güneysu
Konferenz: Post-Quantum Cryptography (PQCrypto 2016)
Referenz: pages 1-17, LNCS Vol. 9606, Fukuoka, Japan

Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions
Autor: Christopher Huth, Paul Duplys, Tim Güneysu
Konferenz: IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)
Referenz: pages 1-6, Sydney, Australia

Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
Autor: Tobias Schneider, Amir Moradi, Tim Güneysu
Konferenz: COSADE 2016, Graz, p. 199-217
Referenz: http://dx.doi.org/10.1007/978-3-319-43283-0_12

Standard lattices in hardware
Autor: James Howe, Ciara Moore, Máire O'Neill, Francesco Regazzoni, Tim Güneysu, K. Beeden
Konferenz: Design Automation Conference (DAC), Austin, USA, 2016, 162:1-162:6
Referenz: http://doi.acm.org/10.1145/2903150.2907756

A grain in the silicon: SCA-protected AES in less than 30 slices
Autor: Pascal Sasdrich, Tim Güneysu
Konferenz: IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP) 2016: 25-32
Referenz: http://dx.doi.org/10.1109/ASAP.2016.7760769

On the Energy Cost of Channel Based Key Agreement
Autor: Christopher Huth, René Guillaume, Paul Duplys, Kumaragurubaran Velmurugan, Tim Güneysu
Konferenz: TrustED@CCS 2016: 31-41
Referenz: http://doi.acm.org/10.1145/2995289.2995291

Secure architectures of future emerging cryptography SAFEcrypto
Autor: Máire O'Neill, Elizabeth O'Sullivan, Gavin McWilliams, Markku-Juhani Saarinen, Ciara Moore, Ayesha Khalid, James Howe, Rafaël Del Pino, Michel Abdalla, Francesco Regazzoni, Felipe Valencia, Tim Güneysu, Tobias Oder, Adrian Waller, Glyn Jones, Anthony Barnett, Robert Griffin, Andrew Byrne, Bassem Ammar, David Lund
Konferenz: Conf. Computing Frontiers 2016: 315-322
Referenz: http://doi.acm.org/10.1145/2903150.2907756

Towards Self-Explaining Digital Systems: A Design Methodology for the Next Generation
Autor: Rolf Drechsler, Christoph Lüth, Goerschwin Fey, Tim Güneysu
Workshop: 3nd International Verification and Security Workshop (IVSW)
Pdf | Referenz: Costa Brava, Spain, 2018

« zurück


©2023 | AG Rechnerarchitektur | Kontakt | Impressum & Datenschutz