Publikationen
2020
J. Danner und M. Kreuzer, "A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes", In: Journal of Groups, Complexity, Cryptology 12 (2020), S. 2:1-2:20, verfügbar unter https://gcc.episciences.org/6212/pdf
J. Horácek und M. Kreuzer, "On conversions from CNF to ANF", J. Symbolic Comput. 100, 2020, S. 164-186.
M. Gay, B. Karp, O. Keren und I. Polian, "Error control scheme for malicious and natural faults in cryptographic modules", In: Journal on Cryptographic Engineering (JCEN), Springer, 2020.
N. Elhamawy, M. Gay und I. Polian, "An Open-Source Area-Optimized ECEG Cryptosystem in Hardware", IEEE Symposium on VLSI (ISVLSI), Limassol, 2020.
- O. Keren und I. Polian, "IPM-RED: combining higher-order masking with robust error detection", In: Journal on Cryptographic Engineering (JCEN), Springer, 2020.
2019
F. Valencia, I. Polian und F. Regazzoni, "Fault Sensitivity Analysis of Lattice-Based Post-Quantum Cryptographic Components", In: D. N. Pnevmatikatos et al. (eds.), Proc. Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS), LNCS 11733, Samos, 2019, pp. 107-132.
I. Polian, M. Gay, T. Paxian, M. Sauer und B. Becker, "Automatic Construction of Fault Attacks on Cryptographic Hardware Implementations", In: Breier J. et al. (eds), Automated Methods in Cryptographic Fault Analysis, Springer, Cham, 2019.
J. Horácek, "Algebraic and Logic Solving Methods for Cryptanalysis", dissertation, University of Passau, 2019, available here.
M. Gay, B. Karp, O. Keren und I. Polian, "Towards Error-correcting Architectures for Cryptographic Circuits Based on Rabii-Keren Codes", IEEE Embedded Systems Letters, 2019.
M. Gay, T. Paxian, D. Upadhyaya, B. Becker und I. Polian, "Hardware-oriented algebraic fault attack framework with multiple fault injection support", Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Atlanta, 2019, pp. 25-32.
M. Kreuzer, N. Elhamawy, M. Gay, A.-S. Messeng Ekossono und I. Polian, "Fault attacks on the elliptic curve ElGamal cryptosystem", Preprint 7/2019, 9 pages, available here.
M. Kreuzer, N. Elhamawy, M. Gay, A.-S. Messeng Ekossono und I. Polian, "Fault attacks on ElGamal-type cryptosystems", Preprint 12/2019, 23 pages, available here.
O. Keren und I. Polian, "A Comment on Information Leakage from Robust Code-based Checkers Detecting Fault Attacks on Cryptographic Primitives", In: K. Heydemann et al. (eds.) Int. Workshop on Security Proofs for Embedded Systems (PROOFS), Atlanta, 2019, pp. 49-63.
2018
B. Karp, M. Gay, O. Keren und I. Polian, "Detection and Correction of Malicious and Natural Faults in Cryptographic Modules“, in: L. Batina et al. (eds.) Int. Workshop on Security Proofs for Embedded Systems (PROOFS), Amsterdam, 2018, pp. 68-82.
B. Karp, M. Gay, O. Keren und I. Polian, "Security-oriented Code-based Architectures for Mitigating Fault Attacks“, Proc. Design of Circuits and Integrated Systems (DCIS), Lyon, 2018, pp. 168-174.
J. Horácek und M. Kreuzer, "3BA: A border basis solver with a SAT extension“, in: J.H. Davenport et al. (Eds.), Mathematical Software (ICMS), LNCS 10931, Basel, 2018, pp. 209-217.
J. Horácek und M. Kreuzer, "Refutation of products of linear polynomials", in: Proc. Third Int. Workshop on Satisfiability Checking and Symbolic Computation (SC^2), Oxford, 2018, avalable here.
S. Nejati, J. Horacek, C. H. Gebotys und V. Ganesh, "Algebraic Fault Attack on SHA Hash Functions Using Programmatic SAT Solvers", Proc. Int. Conf. on Principles and Practice of Constraint Programming (CP), LNCS 11008, Lille, 2018, pp. 737-754.
T. Paxian, S. Reimer und B. Becker, "Dynamic Polynomial Watchdog Encoding for Solving Weighted MaxSAT", Int. Conf. on Theory and Applications of Satisfiability Testing (SAT), LNCS 10929, Oxford, 2018, pp. 37 – 53.
2017
I. Polian und F. Regazzoni, "Counteracting Malicious Faults in Cryptographic Circuits”, IEEE European Test Symp., Limassol, 2017.
J. Burchard, A.-S. Messeng Ekossono, J. Horacek, M. Gay, B. Becker, T. Schubert, M. Kreuzer und I. Polian, "Towards Mixed Structural-Functional Models for Algebraic Fault Attacks on Ciphers“, in: IEEE 2nd Int. Verification and Security Workshop (IVSW), Thessaloniki, 2017, IEEE Xplore, available here.
J. Burchard, M. Gay, A.-S. Messeng Ekossono, J. Horacek, B. Becker, T. Schubert, M. Kreuzer und I. Polian, "AutoFault: Towards Automatic Construction of Algebraic Fault Attacks", Proc. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Taipei, 2017, pp. 65-72.
J. Horácek, J. Burchard, B. Becker und M. Kreuzer, "Integrating algebraic and SAT solvers", in: J. Blömer et al. (eds.), Int. Conf. on Math. Aspects of Computer and Inf. Sciences (MACIS 2017), LNCS 10693, Vienna, 2017, pp 147-162.
J. Horácek und M. Kreuzer, "On conversions from CNF to ANF", Proc. 2nd Int. Workshop on Satisfiability Checking and Symbolic Computation (SC^2), Kaiserslautern, 2017, available here.
J. Horácek, M. Kreuzer und A.-S. Messeng Ekossono, "A Signature Based Border Basis Algorithm”, Conf. on Algebraic Informatics (CAI), Kalamata, 2017.
2016
- J. Burchard, T. Schubert und B. Becker, "Distributed Parallel #SAT Solving", IEEE Cluster 2016, available here.
- J. Horacek, M. Kreuzer und A.-S. Messeng Ekossono, "Computing Boolean Border Bases", in: J. Davenport et. al. (eds.), Int. Symp. on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), Timisoara, 2016, pp. 465-472, DOI:10.1109/SYNASC.2016.076.
M. Gay, J. Burchard, J. Horacek, A.-S. Messeng Ekossono, T. Schubert, B. Becker, M. Kreuzer und I. Polian, "Small scale AES toolbox: Algebraic and propositional formulas, circuit-implementations and fault equations", Proc. Conf. on Trustworthy Manufacturing and Utilization of Secure Devices, Barcelona, 2016. OpenAccess here.