Publications
2020
J. Danner and M. Kreuzer, "A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes", In: Journal of Groups, Complexity, Cryptology 12 (2020), S. 2:1-2:20, verfügbar unter https://gcc.episciences.org/6212/pdf
J. Horácek and M. Kreuzer, "On conversions from CNF to ANF", J. Symbolic Comput. 100, 2020, S. 164-186.
M. Gay, B. Karp, O. Keren, and I. Polian, "Error control scheme for malicious and natural faults in cryptographic modules", In: Journal on Cryptographic Engineering (JCEN), Springer, 2020.
N. Elhamawy, M. Gay, and I. Polian, "An Open-Source Area-Optimized ECEG Cryptosystem in Hardware", IEEE Symposium on VLSI (ISVLSI), Limassol, 2020.
- O. Keren and I. Polian, "IPM-RED: combining higher-order masking with robust error detection", In: Journal on Cryptographic Engineering (JCEN), Springer, 2020.
2019
F. Valencia, I. Polian, and F. Regazzoni, "Fault Sensitivity Analysis of Lattice-Based Post-Quantum Cryptographic Components", In: D. N. Pnevmatikatos et al. (eds.), Proc. Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS), LNCS 11733, Samos, 2019, pp. 107-132.
I. Polian, M. Gay, T. Paxian, M. Sauer, and B. Becker, "Automatic Construction of Fault Attacks on Cryptographic Hardware Implementations", In: Breier J. et al. (eds), Automated Methods in Cryptographic Fault Analysis, Springer, Cham, 2019.
J. Horácek, "Algebraic and Logic Solving Methods for Cryptanalysis", dissertation, University of Passau, 2019, available here.
M. Gay, B. Karp, O. Keren, and I. Polian, "Towards Error-correcting Architectures for Cryptographic Circuits Based on Rabii-Keren Codes", IEEE Embedded Systems Letters, 2019.
M. Gay, T. Paxian, D. Upadhyaya, B. Becker, and I. Polian, "Hardware-oriented algebraic fault attack framework with multiple fault injection support", Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Atlanta, 2019, pp. 25-32.
M. Kreuzer, N. Elhamawy, M. Gay, A.-S. Messeng Ekossono and I. Polian, "Fault attacks on the elliptic curve ElGamal cryptosystem", Preprint 7/2019, 9 pages, available here.
M. Kreuzer, N. Elhamawy, M. Gay, A.-S. Messeng Ekossono and I. Polian, "Fault attacks on ElGamal-type cryptosystems", Preprint 12/2019, 23 pages, available here.
O. Keren and I. Polian, "A Comment on Information Leakage from Robust Code-based Checkers Detecting Fault Attacks on Cryptographic Primitives", In: K. Heydemann et al. (eds.) Int. Workshop on Security Proofs for Embedded Systems (PROOFS), Atlanta, 2019, pp. 49-63.
2018
B. Karp, M. Gay, O. Keren, and I. Polian, "Detection and Correction of Malicious and Natural Faults in Cryptographic Modules“, in: L. Batina et al. (eds.) Int. Workshop on Security Proofs for Embedded Systems (PROOFS), Amsterdam, 2018, pp. 68-82.
B. Karp, M. Gay, O. Keren, and I. Polian, "Security-oriented Code-based Architectures for Mitigating Fault Attacks“, Proc. Design of Circuits and Integrated Systems (DCIS), Lyon, 2018, pp. 168-174.
J. Horácek and M. Kreuzer, "3BA: A border basis solver with a SAT extension“, in: J.H. Davenport et al. (Eds.), Mathematical Software (ICMS), LNCS 10931, Springer Int. Publ., Basel, 2018, pp. 209-217.
- J. Horácek and M. Kreuzer, "Refutation of products of linear polynomials", in: Proc. Third Int. Workshop on Satisfiability Checking and Symbolic Computation (SC^2), Oxford, 2018, avalable here.
S. Nejati, J. Horacek, C. H. Gebotys, and V. Ganesh, "Algebraic Fault Attack on SHA Hash Functions Using Programmatic SAT Solvers", Proc. Int. Conf. on Principles and Practice of Constraint Programming (CP), LNCS 11008, Lille, 2018, pp. 737-754.
T. Paxian, S. Reimer, and B. Becker, "Dynamic Polynomial Watchdog Encoding for Solving Weighted MaxSAT", Int. Conf. on Theory and Applications of Satisfiability Testing (SAT), LNCS 10929, Oxford, 2018, pp. 37 – 53.
2017
I. Polian and F. Regazzoni, "Counteracting Malicious Faults in Cryptographic Circuits”, IEEE European Test Symp., Limassol, 2017.
J. Burchard, A.-S. Messeng Ekossono, J. Horacek, M. Gay, B. Becker, T. Schubert, M. Kreuzer, and I. Polian, "Towards Mixed Structural-Functional Models for Algebraic Fault Attacks on Ciphers“, in: IEEE 2nd Int. Verification and Security Workshop (IVSW), Thessaloniki, 2017, IEEE Xplore, available here.
J. Burchard, M. Gay, A.-S. Messeng Ekossono, J. Horacek, B. Becker, T. Schubert, M. Kreuzer, and I. Polian, "AutoFault: Towards Automatic Construction of Algebraic Fault Attacks", Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Taipei, 2017, pp. 65-72.
J. Horácek, J. Burchard, B. Becker, and M. Kreuzer, "Integrating algebraic and SAT solvers", in: J. Blömer et al. (eds.), Int. Conf. on Math. Aspects of Computer and Inf. Sciences (MACIS 2017), LNCS 10693, Springer Int. Publ., Cham, 2017, pp 147-162.
J. Horácek and M. Kreuzer, "On conversions from CNF to ANF", Proc. 2nd Int. Workshop on Satisfiability Checking and Symbolic Computation (SC^2), Kaiserslautern, 2017, available here.
J. Horácek, M. Kreuzer, and A.-S. Messeng Ekossono, "A Signature Based Border Basis Algorithm”, Conf. on Algebraic Informatics (CAI), Kalamata, 2017.
2016
- J. Burchard, T. Schubert, and B. Becker, "Distributed Parallel #SAT Solving", IEEE Cluster 2016, available here.
- J. Horacek, M. Kreuzer, and A.-S. Messeng Ekossono, "Computing Boolean Border Bases", in: J. Davenport et. al. (eds.), Int. Symp. on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), Timisoara, 2016, pp. 465-472, DOI:10.1109/SYNASC.2016.076.
M. Gay, J. Burchard, J. Horacek, A.-S. Messeng Ekossono, T. Schubert, B. Becker, M. Kreuzer, and I. Polian, "Small scale AES toolbox: Algebraic and propositional formulas, circuit-implementations and fault equations", Proc. Conf. on Trustworthy Manufacturing and Utilization of Secure Devices, Barcelona, 2016. OpenAccess here.