A survey of algorithmic methods in IC reverse engineering L Azriel, J Speith, N Albartus, R Ginosar, A Mendelson, C Paar Journal of Cryptographic Engineering 11 (3), 299-315, 2021 | 29 | 2021 |
Towards practical microcontroller implementation of the signature scheme Falcon T Oder, J Speith, K Höltgen, T Güneysu Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019 …, 2019 | 25 | 2019 |
Evaluation of lattice-based signature schemes in embedded systems T Güneysu, M Krausz, T Oder, J Speith 2018 25th IEEE International Conference on Electronics, Circuits and Systems …, 2018 | 25 | 2018 |
How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations J Speith, F Schweins, M Ender, M Fyrbiak, A May, C Paar 2022 IEEE Symposium on Security and Privacy (SP), 1067-1082, 2022 | 10 | 2022 |
LifeLine for FPGA protection: Obfuscated cryptography for real-world security F Stolz, N Albartus, J Speith, S Klix, C Nasenberg, A Gula, M Fyrbiak, ... Cryptology ePrint Archive, 2021 | 4 | 2021 |
A lattice-based AKE on ARM Cortex-M4 J Speith, T Oder, M Kneib, T Güneysu BalkanCryptSec 2018, 2018 | 4 | 2018 |
Hardware-Trojaner: Die unsichtbare Gefahr J Speith, S Becker, M Ender, E Puschner, C Paar Datenschutz und Datensicherheit-DuD 44 (7), 446-450, 2020 | 2 | 2020 |
Evil from Within: Machine Learning Backdoors through Hardware Trojans A Warnecke, J Speith, JN Möller, K Rieck, C Paar arXiv preprint arXiv:2304.08411, 2023 | 1 | 2023 |
Expanding explainability: from explainable artificial intelligence to explainable hardware T Speith, J Speith, S Becker, Y Zou, A Biega, C Paar arXiv preprint arXiv:2302.14661, 2023 | 1 | 2023 |
Stealing Maggie's Secrets--On the Challenges of IP Theft Through FPGA Reverse Engineering S Klix, N Albartus, J Speith, P Staat, A Verstege, A Wilde, D Lammers, ... arXiv preprint arXiv:2312.06195, 2023 | | 2023 |