News/Upcoming Events

Date Location Participants
ACNS 2015, New York, USA Tobias Schneider
COSADE 2015, Berlin, GER Alexander Wild
Pascal Sasdrich
DIMACS Workshop on The Mathematics of Post-Quantum Cryptography, Rutgers University, USA Tim Güneysu
Real World Cryptography Workshop, London, UK Ingo von Maurich
Thomas Pöppelmann

Accepted Papers

Leakage Assessment Methodology - a clear roadmap for side-channel evaluations, Tobias Schneider, Amir Moradi, CHES 2015.

Assessment of Hiding the Higher-Order Leakages in Hardware, what are the achievements versus overheads?, Amir Moradi, Alexander Wild, CHES 2015.

Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware, Tobias Schneider, Amir Moradi, Tim Güneysu, ACNS 2015.

Differential Power Analysis of a McEliece Cryptosystem, Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt, ACNS 2015.

Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs, Alexander Wild, Amir Moradi, Tim Güneysu, COSADE 2015.

Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives, Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu, COSADE 2015.

Teching courses in winter term 2015/2016

Seminars Series


  • Hardware Security
  • Post-Quantum Cryptography
    • Lattice-based Cryptography
    • Code-based Cryptography
    • Hash-based Cryptography
  • Physical Security