Christof Paar

Affiliations: 
Worcester Polytechnic Institute, Worcester, MA, United States 
Area:
Electronics and Electrical Engineering, Computer Science, Mathematics
Google:
"Christof Paar"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Ghandali S, Moos T, Moradi A, et al. (2020) Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations Ieee Transactions On Very Large Scale Integration Systems. 28: 1435-1448
Fyrbiak M, Wallat S, Reinhard S, et al. (2020) Graph Similarity and its Applications to Hardware Security Ieee Transactions On Computers. 69: 505-519
Speith J, Becker S, Ender M, et al. (2020) Hardware-Trojaner: Die unsichtbare Gefahr Datenschutz Und Datensicherheit - Dud. 44: 446-450
Kison C, Awad OM, Fyrbiak M, et al. (2019) Security Implications of Intentional Capacitive Crosstalk Ieee Transactions On Information Forensics and Security. 14: 3246-3258
Fyrbiak M, Wallat S, Swierczynski P, et al. (2019) HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion Ieee Transactions On Dependable and Secure Computing. 16: 498-510
Wollinger T, Paar C. (2019) Security benötigt einen holistischen Ansatz Atzelektronik Worldwide. 14: 20-23
Fyrbiak M, Rokicki S, Bissantz N, et al. (2018) Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors Ieee Transactions On Computers. 67: 307-321
Swierczynski P, Becker GT, Moradi A, et al. (2018) Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs Ieee Transactions On Computers. 67: 348-360
Vijayakumar A, Patil VC, Holcomb DE, et al. (2017) Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques Ieee Transactions On Information Forensics and Security. 12: 64-77
Wallat S, Fyrbiak M, Schlogel M, et al. (2017) A look at the dark side of hardware reverse engineering - a case study Arxiv: Cryptography and Security. 95-100
See more...