Christof Paar
Affiliations: | Worcester Polytechnic Institute, Worcester, MA, United States |
Area:
Electronics and Electrical Engineering, Computer Science, MathematicsGoogle:
"Christof Paar"Children
Sign in to add traineeAdam J. Elbirt | grad student | 2002 | Worcester Polytechnic Institute |
Gerardo Orlando | grad student | 2002 | Worcester Polytechnic Institute |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Ghandali S, Moos T, Moradi A, et al. (2020) Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations Ieee Transactions On Very Large Scale Integration Systems. 28: 1435-1448 |
Fyrbiak M, Wallat S, Reinhard S, et al. (2020) Graph Similarity and its Applications to Hardware Security Ieee Transactions On Computers. 69: 505-519 |
Speith J, Becker S, Ender M, et al. (2020) Hardware-Trojaner: Die unsichtbare Gefahr Datenschutz Und Datensicherheit - Dud. 44: 446-450 |
Kison C, Awad OM, Fyrbiak M, et al. (2019) Security Implications of Intentional Capacitive Crosstalk Ieee Transactions On Information Forensics and Security. 14: 3246-3258 |
Fyrbiak M, Wallat S, Swierczynski P, et al. (2019) HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion Ieee Transactions On Dependable and Secure Computing. 16: 498-510 |
Wollinger T, Paar C. (2019) Security benötigt einen holistischen Ansatz Atzelektronik Worldwide. 14: 20-23 |
Fyrbiak M, Rokicki S, Bissantz N, et al. (2018) Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors Ieee Transactions On Computers. 67: 307-321 |
Swierczynski P, Becker GT, Moradi A, et al. (2018) Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs Ieee Transactions On Computers. 67: 348-360 |
Vijayakumar A, Patil VC, Holcomb DE, et al. (2017) Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques Ieee Transactions On Information Forensics and Security. 12: 64-77 |
Wallat S, Fyrbiak M, Schlogel M, et al. (2017) A look at the dark side of hardware reverse engineering - a case study Arxiv: Cryptography and Security. 95-100 |