Follow
Tim Güneysu
Tim Güneysu
Chair for Security Engineering, Ruhr-Universität Bochum
Verified email at rub.de - Homepage
Title
Cited by
Cited by
Year
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
J Borghoff, A Canteaut, T Güneysu, EB Kavun, M Knezevic, LR Knudsen, ...
International conference on the theory and application of cryptology and …, 2012
8702012
Practical lattice-based cryptography: A signature scheme for embedded systems
T Güneysu, V Lyubashevsky, T Pöppelmann
International Workshop on Cryptographic Hardware and Embedded Systems, 530-547, 2012
3212012
Trojan side-channels: Lightweight hardware trojans through side-channel engineering
L Lin, M Kasper, T Güneysu, C Paar, W Burleson
International Workshop on Cryptographic Hardware and Embedded Systems, 382-395, 2009
2352009
Exploiting the power of GPUs for asymmetric cryptography
R Szerwinski, T Güneysu
International Workshop on Cryptographic hardware and embedded systems, 79-99, 2008
2312008
Cryptanalysis with COPACOBANA
T Güneysu, T Kasper, M Novotný, C Paar, A Rupp
IEEE Transactions on computers 57 (11), 1498-1513, 2008
2142008
Ultra high performance ECC over NIST primes on commercial FPGAs
T Güneysu, C Paar
International Workshop on Cryptographic Hardware and Embedded Systems, 62-78, 2008
1962008
Towards practical lattice-based public-key encryption on reconfigurable hardware
T Pöppelmann, T Güneysu
International Conference on Selected Areas in Cryptography, 68-85, 2013
1822013
Generic side-channel countermeasures for reconfigurable devices
T Güneysu, A Moradi
International Workshop on Cryptographic Hardware and Embedded Systems, 33-48, 2011
1712011
Towards efficient arithmetic for lattice-based cryptography on reconfigurable hardware
T Pöppelmann, T Güneysu
International conference on cryptology and information security in Latin …, 2012
1672012
Enhanced lattice-based signatures on reconfigurable hardware
T Pöppelmann, L Ducas, T Güneysu
International Workshop on Cryptographic Hardware and Embedded Systems, 353-370, 2014
1532014
Compact implementation and performance evaluation of block ciphers in ATtiny devices
T Eisenbarth, Z Gong, T Güneysu, S Heyse, S Indesteege, S Kerckhof, ...
International Conference on Cryptology in Africa, 172-187, 2012
1342012
High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers
T Pöppelmann, T Oder, T Güneysu
International conference on cryptology and information security in Latin …, 2015
1262015
Practical CCA2-secure and masked ring-LWE implementation
T Oder, T Schneider, T Pöppelmann, T Güneysu
Cryptology ePrint Archive, 2016
1122016
Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices
S Heyse, I Maurich, T Güneysu
International Conference on Cryptographic Hardware and Embedded Systems, 273-292, 2013
1102013
ParTI–towards combined hardware countermeasures against side-channel and fault-injection attacks
T Schneider, A Moradi, T Güneysu
Annual International Cryptology Conference, 302-332, 2016
1032016
MicroEliece: McEliece for embedded devices
T Eisenbarth, T Güneysu, S Heyse, C Paar
International Workshop on Cryptographic Hardware and Embedded Systems, 49-64, 2009
1022009
Reconfigurable trusted computing in hardware
T Eisenbarth, T Güneysu, C Paar, AR Sadeghi, D Schellekens, M Wolf
Proceedings of the 2007 ACM workshop on Scalable trusted computing, 15-20, 2007
962007
Software speed records for lattice-based signatures
T Güneysu, T Oder, T Pöppelmann, P Schwabe
International Workshop on Post-Quantum Cryptography, 67-82, 2013
922013
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware
I Dinur, T Güneysu, C Paar, A Shamir, R Zimmermann
International Conference on the Theory and Application of Cryptology and …, 2011
852011
High-performance and lightweight lattice-based public-key encryption
J Buchmann, F Göpfert, T Güneysu, T Oder, T Pöppelmann
Proceedings of the 2nd ACM international workshop on IoT privacy, trust, and …, 2016
792016
The system can't perform the operation now. Try again later.
Articles 1–20