Login / Signup
Krypto-Tag
2019
2019
2019
Keyphrases
Publications
2019
Franziskus Kiefer
Crypto (engineering) at Mozilla.
Krypto-Tag
(2019)
Marcin Aftowicz
,
Dan Klann
,
Ievgen Kabin
,
Zoya Dyka
,
Peter Langendörfer
Evaluation of the ECDSA IHP Hardware Accelerator.
Krypto-Tag
(2019)
Kai Lehniger
,
Yauhen Varabei
,
Marcin Aftowicz
,
Seyed Ehsan Hashemi Rastegar
,
Zoya Dyka
,
Peter Langendörfer
Using machine learning techniques for hardware performance counter classification and ROP attack detection.
Krypto-Tag
(2019)
Markus Brandt
,
Claudio Orlandi
,
Kris Shrishak
,
Haya Shulman
Transputation: Transport Framework for Secure Computation.
Krypto-Tag
(2019)
Soundes Marzougui
Applied post-quantum cryptography for embedded systems.
Krypto-Tag
(2019)
Ievgen Kabin
,
Zoya Dyka
,
Dan Klann
,
Peter Langendörfer
ECC Based Secure Authentication Solutions.
Krypto-Tag
(2019)
Markus Brandt
,
Haya Shulman
,
Michael Waidner
Distributed Domain Validation (DDV).
Krypto-Tag
(2019)
Franziskus Kiefer
Welcome to Mozilla.
Krypto-Tag
(2019)
Robert Buhren
Security Overview on Secure Encrypted Virtualization.
Krypto-Tag
(2019)
Joo Cho
,
Stefan-Lukas Gazdag
,
Alexander von Gernler
,
Helmut Grießer
,
Sophia Grundner-Culemann
,
Tobias Guggemos
,
Tobias Heider
,
Daniel Loebenberger
Towards Quantum-resistant Virtual Private Networks.
Krypto-Tag
(2019)
Tim Ohlendorf
,
Wolfgang Studier
,
Marian Margraf
SLIDEDroid: A Secure Lightweight Identity for the Android Platform.
Krypto-Tag
(2019)
Jean Paul Degabriele
,
Christian Janson
,
Patrick Struck
Sponges Resist Leakage: The Case of Authenticated Encryption.
Krypto-Tag
(2019)
Nils Wisiol
Towards Secure Strong PUFs.
Krypto-Tag
(2019)
Robert Buhren
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation.
Krypto-Tag
(2019)
30. Krypto-Tag, Berlin, Germany, March 28-29, 2019
Krypto-Tag
(2019)
Nils Wisiol
XOR Arbiter PUFs: an Empirical Approach to Input Transformations.
Krypto-Tag
(2019)
Tilo Fischer
,
Hendrik Linka
,
Michael Rademacher
,
Karl Jonas
,
Daniel Loebenberger
Analyzing power consumption of TLS ciphers on an ESP32.
Krypto-Tag
(2019)
Lisa Aichele
,
Christopher Huth
Methodology Design for Dynamic Test Method Generation via Existing Module Tests.
Krypto-Tag
(2019)
Alejandro Sosa
,
Ievgen Kabin
,
Zoya Dyka
,
Dan Klann
,
Peter Langendörfer
On the Impact of the Sampling Rate on the Success of Horizontal DEMA Attack.
Krypto-Tag
(2019)
Jakob Wenzel
Design and Analysis of Cryptographic Algorithms for Authentication.
Krypto-Tag
(2019)
Klaus Kursawe
A Dinosaurs view on Blockchains.
Krypto-Tag
(2019)
Daniel Loebenberger
Introduction.
Krypto-Tag
(2019)
Anders P. K. Dalskov
,
Marcel Keller
,
Claudio Orlandi
,
Kris Shrishak
,
Haya Shulman
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
Krypto-Tag
(2019)
Yauhen Varabei
,
Ievgen Kabin
,
Zoya Dyka
,
Dan Klann
,
Peter Langendörfer
Intelligent Clustering as a Means to Improve K-means Based Horizontal Attacks.
Krypto-Tag
(2019)
Marcel Selhorst
Introduction to QPSI - Who we are and what we do Hardware.
Krypto-Tag
(2019)
Roman Natarov
,
Yauhen Varabei
,
Ievgen Kabin
,
Zoya Dyka
,
Peter Langendörfer
Edge computing devices assessment for cryptography and biomedical signal analysis.
Krypto-Tag
(2019)
Vinothkumar Nagasayanan
,
Elias Rohrer
,
Florian Tschorsch
ICRC: Instant Certificate Revocation Checking using Blockchain-backed Bloom Filters.
Krypto-Tag
(2019)
Ievgen Kabin
,
Marcin Aftowicz
,
Dan Klann
,
Yauhen Varabei
,
Zoya Dyka
,
Peter Langendörfer
Horizontal SCA Attack using Machine Learning Algorithms.
Krypto-Tag
(2019)
Kai Mindermann
,
Stefan Wagner
Towards a central, distributed and secure default cryptography parameter set.
Krypto-Tag
(2019)
Victor van der Veen
When Memory Serves Not So Well - Memory Errors 30 Years Later.
Krypto-Tag
(2019)
Shinjo Park
,
Altaf Shaik
,
Ravishankar Borgaonkar
,
Jean-Pierre Seifert
Anatomy of Commercial IMSI Catchers and Detectors.
Krypto-Tag
(2019)
Markus Brandt
,
Haya Shulman
,
Michael Waidner
Internet As a Source of Randomness.
Krypto-Tag
(2019)
31. Krypto-Tag, Berlin, Germany, October 17-18, 2019
Krypto-Tag
(2019)
Franziska Boenisch
Applying Differential Privacy to Machine Learning: Challenges and Potentials.
Krypto-Tag
(2019)
2018
Daniel Günther
Private Function Evalutation with Universal Circuits.
Krypto-Tag
(2018)
29. Krypto-Tag, Renningen, Germany, September 6-7, 2018
Krypto-Tag
(2018)
Patrick Struck
Challenges in Post-Quantum Security Reductions.
Krypto-Tag
(2018)
Dan Kreiser
,
Zoya Dyka
,
Ievgen Kabin
,
Peter Langendörfer
HCCA against Montgomery kP Design.
Krypto-Tag
(2018)
Stefan-Lukas Gazdag
Post-Quantum Software Updates.
Krypto-Tag
(2018)
Ievgen Kabin
,
Zoya Dyka
,
Dan Kreiser
,
Peter Langendörfer
Comments On: Constant Time Modular Inversion.
Krypto-Tag
(2018)
Oleksandr Tkachenko
Privacy-Preserving Genomics on a Large Scale.
Krypto-Tag
(2018)
Eike Stadtländer
,
Michael Nüsken
Automatic Security Analysis in the Symbolic Model using Tamarin-Prover.
Krypto-Tag
(2018)
Andreas Schaffhauser
Algebraic Analysis of the Initialization Phase Grain Version 1 using a Degree-Oriented Interpolation Technique.
Krypto-Tag
(2018)
Dmytro Petryk
,
Zoya Dyka
,
Peter Langendörfer
Optical Fault Injections: Most Often Used Setups.
Krypto-Tag
(2018)
Tim Fritzmann
Error-Correcting Codes for Lattice-Based Key Exchange.
Krypto-Tag
(2018)
Markus Klingenstein
,
Marcel Kneib
Hardware Accelerated Sender Identification for the Controller Area Network.
Krypto-Tag
(2018)
Daniel Rausch
Universal Composability: A Comparison of Different Models.
Krypto-Tag
(2018)
Marcel Fourné
Can Verification of Cryptographic Libraries be liberated from the von Neumann Style?
Krypto-Tag
(2018)
Virginie Lallemand
,
Gregor Leander
,
Patrick Neumann
,
Friedrich Wiemer
BISON - Instantiating the Whitened Swap-Or-Not Construction.
Krypto-Tag
(2018)
Kai Mindermann
,
Stefan Wagner
CryptoExamples: Secure, minimal, complete, copyable and tested code examples for Crypto APIs.
Krypto-Tag
(2018)