Cryptanalysis with COPACOBANA T Güneysu, T Kasper, M Novotný, C Paar, A Rupp
IEEE Transactions on computers 57 (11), 1498-1513, 2008
200 2008 Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves? A Bogdanov, T Eisenbarth, A Rupp, C Wolf
International Workshop on Cryptographic Hardware and Embedded Systems, 45-61, 2008
90 2008 A real-world attack breaking A5/1 within hours T Gendrullis, M Novotný, A Rupp
International Workshop on Cryptographic Hardware and Embedded Systems, 266-282, 2008
71 2008 How to Break DES for BC 8,980 S Kumar, C Paar, J Pelzl, G Pfeiffer, A Rupp, M Schimmler
SHARCS ‘06–Special-purpose Hardware for Attacking Cryptographic Systems, 17-35, 2006
52 2006 How to Break DES for BC 8,980 S Kumar, C Paar, J Pelzl, G Pfeiffer, A Rupp, M Schimmler
SHARCS ‘06–Special-purpose Hardware for Attacking Cryptographic Systems, 17-35, 2006
52 2006 How to Break DES for BC 8,980 S Kumar, C Paar, J Pelzl, G Pfeiffer, A Rupp, M Schimmler
SHARCS ‘06–Special-purpose Hardware for Attacking Cryptographic Systems, 17-35, 2006
52 2006 A parallel hardware architecture for fast Gaussian elimination over GF (2) A Rupp, J Pelzl, C Paar, MC Mertens, A Bogdanov
2006 14th Annual IEEE Symposium on Field-Programmable Custom Computing …, 2006
49 2006 Fast multivariate signature generation in hardware: The case of rainbow S Balasubramanian, HW Carter, A Bogdanov, A Rupp, J Ding
2008 International Conference on Application-Specific Systems, Architectures …, 2008
42 2008 Polynomial spaces: A new framework for composite-to-prime-order transformations G Herold, J Hesse, D Hofheinz, C Rafols, A Rupp
Annual Cryptology Conference, 261-279, 2014
32 2014 On the equivalence of RSA and factoring regarding generic ring algorithms G Leander, A Rupp
International Conference on the Theory and Application of Cryptology and …, 2006
32 2006 Standard versus selective opening security: separation and equivalence results D Hofheinz, A Rupp
Theory of Cryptography Conference, 591-615, 2014
28 2014 A hardware-assisted realtime attack on A5/2 without precomputations A Bogdanov, T Eisenbarth, A Rupp
International Workshop on Cryptographic Hardware and Embedded Systems, 394-412, 2007
25 2007 Fault-tolerant aggregate signatures G Hartung, B Kaidel, A Koch, J Koch, A Rupp
Public-Key Cryptography–PKC 2016, 331-356, 2016
20 2016 Packet trace manipulation rramework for test labs A Rupp, H Dreger, A Feldmann, R Sommer
Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, 251-256, 2004
20 2004 Cryptographic theory meets practice: Efficient and privacy-preserving payments for public transport A Rupp, F Baldimtsi, G Hinterwälder, C Paar
ACM Transactions on Information and System Security (TISSEC) 17 (3), 1-31, 2015
19 2015 Smith-a parallel hardware architecture for fast gaussian elimination over gf (2) A Bogdanov, MC Mertens, C Paar, J Pelzl, A Rupp
Workshop on Special-purpose Hardware for Attacking Cryptographic Systems …, 2006
19 2006 Public-key encryption with simulation-based selective-opening security and compact ciphertexts D Hofheinz, T Jager, A Rupp
Theory of Cryptography Conference, 146-168, 2016
18 2016 The semi-generic group model and applications to pairing-based cryptography T Jager, A Rupp
International Conference on the Theory and Application of Cryptology and …, 2010
18 2010 ECRYPT yearly report on algorithms and keysizes S Babbage, D Catalano, C Cid, B de Weger, O Dunkelman, C Gehrmann, ...
18 2009 Faster multi-exponentiation through caching: accelerating (EC) DSA signature verification B Möller, A Rupp
International Conference on Security and Cryptography for Networks, 39-56, 2008
18 2008