- Cryptographic Implementations and Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
- Cryptography and Residue Arithmetic
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Security and Verification in Computing
- Integrated Circuits and Semiconductor Failure Analysis
- Wireless Communication Security Techniques
- Advanced Authentication Protocols Security
- Neuroscience and Neural Engineering
- User Authentication and Security Systems
- RFID technology advancements
- Adversarial Robustness in Machine Learning
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Wireless Communication Technologies
- Security in Wireless Sensor Networks
- Parallel Computing and Optimization Techniques
- Embedded Systems Design Techniques
- graph theory and CDMA systems
- Algebraic Geometry and Number Theory
- Bluetooth and Wireless Communication Technologies
- Cellular Automata and Applications
- IPv6, Mobility, Handover, Networks, Security
Max Planck Institute for Security and Privacy
2019-2025
Southeast University
2024
Ruhr University Bochum
2012-2021
LVR-Klinik Köln
2019-2020
University of Massachusetts Amherst
2010-2019
Amherst College
2015
University of Duisburg-Essen
2015
Escrypt (Germany)
2006-2010
Worcester Polytechnic Institute
1996-2003
Karlsruhe University of Education
2003
The tight cost and implementation constraints of high-volume products, including secure RFID tags smart cards, require specialized cryptographic implementations. authors review recent developments in this area for symmetric asymmetric ciphers, targeting embedded hardware software. In article, we present a selection recently published lightweight-cryptography implementations compare them to state-of-the-art results their field.
The technical analysis used in determining which of the potential Advanced Encryption Standard candidates was selected as Algorithm includes efficiency testing both hardware and software implementations candidate algorithms. Reprogrammable devices such field-programmable gate arrays (FPGAs) are highly attractive options for encryption algorithms, they provide cryptographic algorithm agility, physical security, potentially much higher performance than solutions. This contribution investigates...
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems. In order to protect intellectual property prevent fraud, by cloning a design embedded into an FPGA or manipulating its content, current employ bitstream encryption feature. We develop successful attack on engine integrated in widespread Virtex-II Pro from Xilinx, using side-channel analysis. After measuring...
It is widely recognized that security issues will play a crucial role in the majority of future computer and communication systems. Central tools for achieving system are cryptographic algorithms. For performance as well physical reasons, it often advantageous to realize algorithms hardware. In order overcome well-known drawback reduced flexibility associated with traditional ASIC solutions, this contribution proposes arithmetic architectures which optimized modern field programmable gate...
In the last decade, it has become apparent that embedded systems are integral parts of our every day lives. The wireless nature many applications as well their omnipresence made need for security and privacy preserving mechanisms particularly important. Thus, field programmable gate arrays (FPGAs) systems, is imperative to consider a whole. This contribution provides state-of-the-art description issues on FPGAs, both from system implementation perspectives. We discuss advantages...