What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tim Güneysu
Google Scholar
ORCID:
0000-0002-3293-4989
82
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
KeyVisor - A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies.
Fabian Schwarz
Jan Philipp Thoma
Christian Rossow
Tim Güneysu
2025
journals/tches
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC.
Najwa Aaraj
Abdelrahaman Aly
Tim Güneysu
Chiara Marcolla
Johannes Mono
Rogerio Paludo
Iván Santos-González
Mireia Scholz
Eduardo Soria-Vazquez
Victor Sucasas
Ajith Suresh
2025
conf/eurocrypt
INDIANA - Verifying (Random) Probing Security Through Indistinguishability Analysis.
Christof Beierle
Jakob Feldtkeller
Anna Guinet
Tim Güneysu
Gregor Leander
Jan Richter-Brockmann
Pascal Sasdrich
2025
journals/tches
HADES: Automated Hardware Design Exploration for Cryptographic Primitives.
Fabian Buschkowski
Georg Land
Niklas Höher
Jan Richter-Brockmann
Pascal Sasdrich
Tim Güneysu
2025
journals/tches
ABE Cubed: Advanced Benchmarking Extensions for ABE Squared.
Sven Argo
Marloes Venema
Doreen Riepel
Tim Güneysu
Diego F. Aranha
2025
journals/tches
A New Perspective on Key Switching for BGV-like Schemes.
Johannes Mono
Tim Güneysu
2025
journals/tches
pracy: A Practical Compiler for Attribute-Based Encryption in Python.
Sven Argo
Marloes Venema
Adrian Ackermann
Tim Güneysu
2024
journals/tches
Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes.
Johannes Mono
Kamil Kluczniak
Tim Güneysu
2024
journals/tches
Combined Threshold Implementation.
Jakob Feldtkeller
Jan Richter-Brockmann
Pascal Sasdrich
Tim Güneysu
2024
journals/tches
Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware.
Georg Land
Adrian Marotzke
Jan Richter-Brockmann
Tim Güneysu
2024
journals/tches
HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures.
Jung Hee Cheon
Hyeongmin Choe
Julien Devevey
Tim Güneysu
Dongyeon Hong
Markus Krausz
Georg Land
Marc Möller
Damien Stehlé
MinJune Yi
2024
journals/tches
Correction Fault Attacks on Randomized CRYSTALS-Dilithium.
Elisabeth Krahmer
Peter Pessl
Georg Land
Tim Güneysu
2024
journals/tches
A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps.
Anna Guinet
Georg Land
Ioan Gabriel Bucur
Tim Güneysu
2024
conf/ccs
Practical Post-Quantum Signatures for Privacy.
Sven Argo
Tim Güneysu
Corentin Jeudy
Georg Land
Adeline Roux-Langlois
Olivier Sanders
2024
conf/esorics
Cips: The Cache Intrusion Prevention System.
Jan Philipp Thoma
Florian Stolz
Tim Güneysu
2024
conf/asiaccs
On The Effect of Replacement Policies on The Security of Randomized Cache Architectures.
Moritz Peters
Nicolas Gaudin
Jan Philipp Thoma
Vianney Lapôtre
Pascal Cotret
Guy Gogniat
Tim Güneysu
2024
conf/asiacrypt
Formal Definition and Verification for Combined Random Fault and Random Probing Security.
Sonia Belaïd
Jakob Feldtkeller
Tim Güneysu
Anna Guinet
Jan Richter-Brockmann
Matthieu Rivain
Pascal Sasdrich
Abdul Rahman Taleb
2023
journals/tches
Risky Translations: Securing TLBs against Timing Side Channels.
Florian Stolz
Jan Philipp Thoma
Pascal Sasdrich
Tim Güneysu
2023
conf/ccs
Combined Private Circuits - Combined Security Refurbished.
Jakob Feldtkeller
Tim Güneysu
Thorben Moos
Jan Richter-Brockmann
Sayandeep Saha
Pascal Sasdrich
François-Xavier Standaert
2023
conf/uss
SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization.
Federico Canale
Tim Güneysu
Gregor Leander
Jan Philipp Thoma
Yosuke Todo
Rei Ueno
2023
conf/uss
ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions.
Jan Philipp Thoma
Christian Niesler
Dominic A. Funke
Gregor Leander
Pierre Mayr
Nils Pohl
Lucas Davi
Tim Güneysu
2023
conf/acns
Recommendation for a Holistic Secure Embedded ISA Extension.
Florian Stolz
Marc Fyrbiak
Pascal Sasdrich
Tim Güneysu
2023
conf/asiaccs
Implementing and Optimizing Matrix Triples with Homomorphic Encryption.
Johannes Mono
Tim Güneysu
2023
conf/pkc
A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling.
Markus Krausz
Georg Land
Jan Richter-Brockmann
Tim Güneysu
2023
conf/asiacrypt
Quantitative Fault Injection Analysis.
Jakob Feldtkeller
Tim Güneysu
Patrick Schaumont
2023
conf/africacrypt
Finding and Evaluating Parameters for BGV.
Johannes Mono
Chiara Marcolla
Georg Land
Tim Güneysu
Najwa Aaraj
2022
journals/tches
VERICA - Verification of Combined Attacks Automated formal verification of security against simultaneous information leakage and tampering.
Jan Richter-Brockmann
Jakob Feldtkeller
Pascal Sasdrich
Tim Güneysu
2022
journals/tches
Randomness Optimization for Gadget Compositions in Higher-Order Masking.
Jakob Feldtkeller
David Knichel
Pascal Sasdrich
Amir Moradi
Tim Güneysu
2022
journals/tches
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware.
Jan Richter-Brockmann
Ming-Shing Chen
Santosh Ghosh
Tim Güneysu
2022
conf/ccs
Proof-of-Possession for KEM Certificates using Verifiable Generation.
Tim Güneysu
Philip W. Hodges
Georg Land
Mike Ounsworth
Douglas Stebila
Greg Zaverucha
2022
conf/ccs
CINI MINIS: Domain Isolation for Fault and Combined Security.
Jakob Feldtkeller
Jan Richter-Brockmann
Pascal Sasdrich
Tim Güneysu
2022
conf/acns
Carry-Less to BIKE Faster.
Ming-Shing Chen
Tim Güneysu
Markus Krausz
Jan Philipp Thoma
2021
journals/tches
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security.
Florian Stolz
Nils Albartus
Julian Speith
Simon Klix
Clemens Nasenberg
Aiden Gula
Marc Fyrbiak
Christof Paar
Tim Güneysu
Russell Tessier
2021
journals/tches
FIVER - Robust Verification of Countermeasures against Fault Injections.
Jan Richter-Brockmann
Aein Rezaei Shahmirzadi
Pascal Sasdrich
Amir Moradi
Tim Güneysu
2021
journals/tches
Side-Channel Analysis of the Xilinx Zynq UltraScale+ Encryption Engine.
Benjamin Hettwer
Sebastien Leger
Daniel Fennes
Stefan Gehrer
Tim Güneysu
2020
journals/tches
High-Speed Masking for Polynomial Comparison in Lattice-based KEMs.
Florian Bache
Clara Paglialonga
Tobias Oder
Tobias Schneider
Tim Güneysu
2020
conf/host
Encoding Power Traces as Images for Efficient Side-Channel Analysis.
Benjamin Hettwer
Tobias Horn
Stefan Gehrer
Tim Güneysu
2020
conf/cans
Revisiting ECM on GPUs.
Jonas Wloka
Jan Richter-Brockmann
Colin Stahlke
Thorsten Kleinjung
Christine Priplata
Tim Güneysu
2019
conf/pkc
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto.
Tobias Schneider
Clara Paglialonga
Tobias Oder
Tim Güneysu
2019
conf/sacrypt
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery.
Benjamin Hettwer
Stefan Gehrer
Tim Güneysu
2018
journals/tches
Standard Lattice-Based Key Encapsulation on Embedded Devices.
James Howe
Tobias Oder
Markus Krausz
Tim Güneysu
2018
journals/tches
Practical CCA2-Secure and Masked Ring-LWE Implementation.
Tobias Oder
Tobias Schneider
Thomas Pöppelmann
Tim Güneysu
2018
conf/sacrypt
Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge.
Benjamin Hettwer
Stefan Gehrer
Tim Güneysu
2017
conf/latincrypt
Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs.
Tobias Oder
Tim Güneysu
2017
conf/host
LWE-based lossless computational fuzzy extractor for the Internet of Things.
Christopher Huth
Daniela Becker
Jorge Guajardo
Paul Duplys
Tim Güneysu
2017
conf/ctrsa
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware.
Pascal Sasdrich
Amir Moradi
Tim Güneysu
2016
conf/fse
White-Box Cryptography in the Gray Box - - A Hardware Implementation and its Side Channels -.
Pascal Sasdrich
Amir Moradi
Tim Güneysu
2016
conf/ccs
Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016).
Xinxin Fan
Tim Güneysu
2016
conf/ccs
On the Energy Cost of Channel Based Key Agreement.
Christopher Huth
René Guillaume
Paul Duplys
Kumaragurubaran Velmurugan
Tim Güneysu
2016
conf/ccs
ParTI: Towards Combined Hardware Countermeasures against Side-Channeland Fault-Injection Attacks.
Tobias Schneider
Amir Moradi
Tim Güneysu
2016
conf/ccs
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
Johannes Buchmann
Florian Göpfert
Tim Güneysu
Tobias Oder
Thomas Pöppelmann
2016
conf/crypto
ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks.
Tobias Schneider
Amir Moradi
Tim Güneysu
2016
conf/icisc
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA.
Christopher Huth
Aydin Aysu
Jorge Guajardo
Paul Duplys
Tim Güneysu
2016
conf/ches
Strong 8-bit Sboxes with Efficient Masking in Hardware.
Erik Boss
Vincent Grosso
Tim Güneysu
Gregor Leander
Amir Moradi
Tobias Schneider
2016
conf/host
On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs.
Alexander Wild
Georg T. Becker
Tim Güneysu
2016
conf/sacrypt
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms.
Tobias Schneider
Amir Moradi
François-Xavier Standaert
Tim Güneysu
2015
conf/latincrypt
High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers.
Thomas Pöppelmann
Tobias Oder
Tim Güneysu
2015
conf/acns
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware.
Tobias Schneider
Amir Moradi
Tim Güneysu
2015
conf/host
Achieving side-channel protection with dynamic logic reconfiguration on modern FPGAs.
Pascal Sasdrich
Amir Moradi
Oliver Mischke
Tim Güneysu
2015
conf/host
Security analysis of index-based syndrome coding for PUF-based key generation.
Georg T. Becker
Alexander Wild
Tim Güneysu
2015
conf/sacrypt
Affine Equivalence and Its Application to Tightening Threshold Implementations.
Pascal Sasdrich
Amir Moradi
Tim Güneysu
2014
conf/latincrypt
High-Speed Signatures from Standard Lattices.
Özgür Dagdelen
Rachid El Bansarkhani
Florian Göpfert
Tim Güneysu
Tobias Oder
Thomas Pöppelmann
Ana Helena Sánchez
Peter Schwabe
2014
conf/ches
Enhanced Lattice-Based Signatures on Reconfigurable Hardware.
Thomas Pöppelmann
Léo Ducas
Tim Güneysu
2014
conf/fdtc
Fault Sensitivity Analysis Meets Zero-Value Attack.
Oliver Mischke
Amir Moradi
Tim Güneysu
2013
conf/acns
Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware.
Alexander Wild
Tim Güneysu
Amir Moradi
2013
conf/ches
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices.
Stefan Heyse
Ingo von Maurich
Tim Güneysu
2013
conf/sacrypt
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware.
Thomas Pöppelmann
Tim Güneysu
2012
conf/latincrypt
Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware.
Thomas Pöppelmann
Tim Güneysu
2012
conf/esorics
Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms.
Markus Dürmuth
Tim Güneysu
Markus Kasper
Christof Paar
Tolga Yalçin
Ralf Zimmermann
2012
conf/ches
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems.
Tim Güneysu
Vadim Lyubashevsky
Thomas Pöppelmann
2012
conf/ches
Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware.
Stefan Heyse
Tim Güneysu
2012
conf/asiacrypt
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Julia Borghoff
Anne Canteaut
Tim Güneysu
Elif Bilge Kavun
Miroslav Knezevic
Lars R. Knudsen
Gregor Leander
Ventzislav Nikov
Christof Paar
Christian Rechberger
Peter Rombouts
Søren S. Thomsen
Tolga Yalçin
2012
conf/africacrypt
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Thomas Eisenbarth
Zheng Gong
Tim Güneysu
Stefan Heyse
Sebastiaan Indesteege
Stéphanie Kerckhof
François Koeune
Tomislav Nad
Thomas Plos
Francesco Regazzoni
François-Xavier Standaert
Loïc van Oldeneel tot Oldenzeel
2011
conf/ches
Generic Side-Channel Countermeasures for Reconfigurable Devices.
Tim Güneysu
Amir Moradi
2011
conf/asiacrypt
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.
Itai Dinur
Tim Güneysu
Christof Paar
Adi Shamir
Ralf Zimmermann
2009
conf/ches
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering.
Lang Lin
Markus Kasper
Tim Güneysu
Christof Paar
Wayne P. Burleson
2009
conf/ches
MicroEliece: McEliece for Embedded Devices.
Thomas Eisenbarth
Tim Güneysu
Stefan Heyse
Christof Paar
2009
conf/host
Secure IP-Block Distribution for Hardware Devices.
Jorge Guajardo
Tim Güneysu
Sandeep S. Kumar
Christof Paar
2008
conf/fc
Breaking Legacy Banking Standards with Special-Purpose Hardware.
Tim Güneysu
Christof Paar
2008
conf/ches
Exploiting the Power of GPUs for Asymmetric Cryptography.
Robert Szerwinski
Tim Güneysu
2008
conf/ches
Ultra High Performance ECC over NIST Primes on Commercial FPGAs.
Tim Güneysu
Christof Paar
2007
conf/ccs
Reconfigurable trusted computing in hardware.
Thomas Eisenbarth
Tim Güneysu
Christof Paar
Ahmad-Reza Sadeghi
Dries Schellekens
Marko Wolf
Coauthors
Abdelrahaman Aly
(1)
Abdul Rahman Taleb
(1)
Adeline Roux-Langlois
(1)
Adi Shamir
(1)
Adrian Ackermann
(1)
Adrian Marotzke
(1)
Aein Rezaei Shahmirzadi
(1)
Ahmad-Reza Sadeghi
(1)
Aiden Gula
(1)
Ajith Suresh
(1)
Alexander Wild
(3)
Amir Moradi
(14)
Ana Helena Sánchez
(1)
Anna Guinet
(3)
Anne Canteaut
(1)
Aydin Aysu
(1)
Benjamin Hettwer
(4)
Chiara Marcolla
(2)
Christian Niesler
(1)
Christian Rechberger
(1)
Christian Rossow
(1)
Christine Priplata
(1)
Christof Beierle
(1)
Christof Paar
(10)
Christopher Huth
(3)
Clara Paglialonga
(2)
Clemens Nasenberg
(1)
Colin Stahlke
(1)
Corentin Jeudy
(1)
Damien Stehlé
(1)
Daniel Fennes
(1)
Daniela Becker
(1)
David Knichel
(1)
Diego F. Aranha
(1)
Dominic A. Funke
(1)
Dongyeon Hong
(1)
Doreen Riepel
(1)
Douglas Stebila
(1)
Dries Schellekens
(1)
Eduardo Soria-Vazquez
(1)
Elif Bilge Kavun
(1)
Elisabeth Krahmer
(1)
Erik Boss
(1)
Fabian Buschkowski
(1)
Fabian Schwarz
(1)
Federico Canale
(1)
Florian Bache
(1)
Florian Göpfert
(2)
Florian Stolz
(4)
Francesco Regazzoni
(1)
François Koeune
(1)
François-Xavier Standaert
(3)
Georg Land
(9)
Georg T. Becker
(2)
Greg Zaverucha
(1)
Gregor Leander
(5)
Guy Gogniat
(1)
Hyeongmin Choe
(1)
Ingo von Maurich
(1)
Ioan Gabriel Bucur
(1)
Itai Dinur
(1)
Iván Santos-González
(1)
Jakob Feldtkeller
(8)
James Howe
(1)
Jan Philipp Thoma
(7)
Jan Richter-Brockmann
(12)
Johannes Buchmann
(1)
Johannes Mono
(5)
Jonas Wloka
(1)
Jorge Guajardo
(3)
Julia Borghoff
(1)
Julian Speith
(1)
Julien Devevey
(1)
Jung Hee Cheon
(1)
Kamil Kluczniak
(1)
Kumaragurubaran Velmurugan
(1)
Lang Lin
(1)
Lars R. Knudsen
(1)
Léo Ducas
(1)
Loïc van Oldeneel tot Oldenzeel
(1)
Lucas Davi
(1)
Marc Fyrbiak
(2)
Marc Möller
(1)
Marko Wolf
(1)
Markus Dürmuth
(1)
Markus Kasper
(2)
Markus Krausz
(4)
Marloes Venema
(2)
Matthieu Rivain
(1)
Mike Ounsworth
(1)
Ming-Shing Chen
(2)
MinJune Yi
(1)
Mireia Scholz
(1)
Miroslav Knezevic
(1)
Moritz Peters
(1)
Najwa Aaraj
(2)
Nicolas Gaudin
(1)
Niklas Höher
(1)
Nils Albartus
(1)
Nils Pohl
(1)
Oliver Mischke
(2)
Olivier Sanders
(1)
Özgür Dagdelen
(1)
Pascal Cotret
(1)
Pascal Sasdrich
(15)
Patrick Schaumont
(1)
Paul Duplys
(3)
Peter Pessl
(1)
Peter Rombouts
(1)
Peter Schwabe
(1)
Philip W. Hodges
(1)
Pierre Mayr
(1)
Rachid El Bansarkhani
(1)
Ralf Zimmermann
(2)
Rei Ueno
(1)
René Guillaume
(1)
Robert Szerwinski
(1)
Rogerio Paludo
(1)
Russell Tessier
(1)
Sandeep S. Kumar
(1)
Santosh Ghosh
(1)
Sayandeep Saha
(1)
Sebastiaan Indesteege
(1)
Sebastien Leger
(1)
Simon Klix
(1)
Sonia Belaïd
(1)
Stefan Gehrer
(4)
Stefan Heyse
(4)
Stéphanie Kerckhof
(1)
Sven Argo
(3)
Søren S. Thomsen
(1)
Thomas Eisenbarth
(3)
Thomas Plos
(1)
Thomas Pöppelmann
(8)
Thorben Moos
(1)
Thorsten Kleinjung
(1)
Tim Güneysu
(82)
Tobias Horn
(1)
Tobias Oder
(8)
Tobias Schneider
(8)
Tolga Yalçin
(2)
Tomislav Nad
(1)
Vadim Lyubashevsky
(1)
Ventzislav Nikov
(1)
Vianney Lapôtre
(1)
Victor Sucasas
(1)
Vincent Grosso
(1)
Wayne P. Burleson
(1)
Xinxin Fan
(1)
Yosuke Todo
(1)
Zheng Gong
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to