Markus S. Wamser

  • Citations Per Year
Learn More
With RFID-tags becoming a part of our everyday lives, the need for (ultra-)lightweight implementations of cryptographic algorithms are a major challenge for researchers and engineers alike. While purpose-built algorithms offer low hardware-footprint, their usage is often impeded by the need to comply with standards, most notably the Advanced Encryption(More)
Physical attacks focus on extracting information from internal parts of IC's. One way to achieve this is by means of connecting probes to wires, so that the content of internal buses and registers can be revealed. Protection against this type of attacks exists, but usually is bulky and expensive, e.g. the shielding of secured areas. This paper presents a(More)
We consider the following question: given a group-homomorphic public-key encryption E, a ciphertext c = E(x, pk) hiding a value x using a key pk, and a ”suitable” description of a function f , can we evaluate E(f(x), pk) without decrypting c? We call this an oblivious lookup table and show the existence of such a primitive. To this end, we describe a(More)
The S-Box operation in the Advanced Encryption Standard has a long history of research in tailored and optimised hardware designs. While Canright's design based on tower-field decomposition has long been a benchmark design for low area, designs based on linear-feedback structures achieve lower area and power consumption at the price of additional clock(More)
  • 1