Ich leite seit Oktober 2015 die Arbeitsgruppe Technische Informatik/IT-Sicherheit als Brückenprofessur mit dem Deutschen Forschungszentrum für Künstliche Intelligenz (DFKI) mit dem Forschungsschwerpunkt im Bereich der eingebetteten Sicherheit.
Evaluation of (power) side-channels
in cryptographic implementations
Autor: Florian Bache, Christina Plump, Jonas Wloka, Tim Güneysu, and Rolf Drechsler
Zeitschrift: it – Information Technology
Details: DOI: 10.1515/itit-2018-0028, Volume 61(1) (2019)
Information reconciliation schemes in physical-layer security: A survey
Autor: Christopher Huth, Rene Guillaume, Thomas Strohm, Paul Duplys, Irin Ann Samuel, Tim Güneysu
Zeitschrift: Computer Networks
Details: DOI: 10.1016/j.comnet.2016.06.014, 109: 84-104 (2016)
Nano Security: From Nano-Electronics to Secure Systems
Autor: Ilia Polian, Frank Altmann, Tolga Arul, Christian Boit, Ralf Brederlow, Lucas Davi, Rolf Drechsler, Nan Du, Thomas Eisenbarth, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock, Stefan Katzenbeisser, Akash Kumar, Wolfgang Kunz,
Thomas Mikolajick, Vivek Pachauri, Jean-Pierre Seifert, Frank Sill Torres, Jens Trommer
Konferenz: Design, Automation and Test in Europe Conference (DATE) Pdf | Referenz: Grenoble, France, 2021
Verification of Embedded Binaries using Coverage-guided Fuzzing with SystemC-based Virtual Prototypes
Autor: Vladimir Herdt, Daniel Große, Jonas Wloka, Tim Güneysu, Rolf Drechsler
Konferenz: 30th ACM Great Lakes Symposium on VLSI (GLSVLSI) Pdf | Referenz: Beijing, China, 2020
Confident Leakage Assessment - A Side-Channel
Evaluation Framework based on Confidence Intervals
Autor: Florian Bache, Christina Plump, Tim Güneysu
Konferenz: Design, Automation and Test in Europe (DATE)
Referenz: Dresden, Germany, 2018
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware
Autor: Pascal Sasdrich, Amir Moradi, Tim Güneysu
Konferenz: RSA Conference Cryptographers’ Track (CT-RSA) Pdf | Referenz: San Francisco, US, 2017.
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
Autor: Pascal Sasdrich, Amir Moradi, Tim Güneysu
Konferenz: FSE 2016: 185-203
Referenz: http://dx.doi.org/10.1007/978-3-662-52993-5_10
Strong 8-bit Sboxes with Efficient Masking in Hardware
Autor: Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Konferenz: CHES 2016: 171-193
Referenz: http://dx.doi.org/10.1007/978-3-662-53140-2_9
ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
Autor: Tobias Schneider, Amir Moradi, Tim Güneysu
Konferenz: CRYPTO (2), Santa Barbara, USA, 2016: 302-332
Referenz: http://dx.doi.org/10.1007/978-3-662-53008-5_11
On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs.
Autor: Alexander Wild, Georg T. Becker, Tim Güneysu
Konferenz: Hardware-Oriented Security and Trust (HOST) 2016: 103-108
Referenz: http://dx.doi.org/10.1109/HST.2016.7495565
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
Autor: Christopher Huth, Aydin Aysu, Jorge Guajardo, Paul Duplys, Tim Güneysu
Konferenz: ICISC 2016: 28-48
Referenz: http://dx.doi.org/10.1007/978-3-319-53177-9_2
High-Performance and Lightweight Lattice-Based Public-Key Encryption
Autor: Johannes A. Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann
Konferenz: IoTPTS@AsiaCCS 2016: 2-9
Referenz: http://doi.acm.org/10.1145/2899007.2899011
IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter
Autor: Ingo von Maurich, Lukas Heberle, Tim Güneysu
Konferenz: Post-Quantum Cryptography (PQCrypto 2016)
Referenz: pages 1-17, LNCS Vol. 9606, Fukuoka, Japan
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
Autor: Tobias Schneider, Amir Moradi, Tim Güneysu
Konferenz: COSADE 2016, Graz, p. 199-217
Referenz: http://dx.doi.org/10.1007/978-3-319-43283-0_12
On the Energy Cost of Channel Based Key Agreement
Autor: Christopher Huth, René Guillaume, Paul Duplys, Kumaragurubaran Velmurugan, Tim Güneysu
Konferenz: TrustED@CCS 2016: 31-41
Referenz: http://doi.acm.org/10.1145/2995289.2995291
Secure architectures of future emerging cryptography SAFEcrypto
Autor: Máire O'Neill, Elizabeth O'Sullivan, Gavin McWilliams, Markku-Juhani Saarinen, Ciara Moore, Ayesha Khalid, James Howe, Rafaël Del Pino, Michel Abdalla, Francesco Regazzoni, Felipe Valencia, Tim Güneysu, Tobias Oder, Adrian Waller, Glyn Jones, Anthony Barnett, Robert Griffin, Andrew Byrne, Bassem Ammar, David Lund
Konferenz: Conf. Computing Frontiers 2016: 315-322
Referenz: http://doi.acm.org/10.1145/2903150.2907756
Towards Self-Explaining Digital Systems:
A Design Methodology for the Next Generation
Autor: Rolf Drechsler, Christoph Lüth, Goerschwin Fey, Tim Güneysu
Workshop: 3nd International Verification and Security Workshop (IVSW) Pdf | Referenz: Costa Brava, Spain, 2018