Publications list of Jan Pelzl

Size: px
Start display at page:

Download "Publications list of Jan Pelzl"

Transcription

1 Publications list of Jan Pelzl (December 2014) Books C. Paar, J. Pelzl, Understanding Cryptography A Textbook for Students and Practicioners, Springer Verlag, ISBN , December, J.Pelzl, Practical Aspects of Curve Based Cryptography and Cryptanalysis, Europäischer Universitätsverlag, ISBN , June, Journal Paper A.Weimerskirch, T.Wollinger, J.Pelzl, K.Schramm, Data in Transit, Thinking Highways, Vol.4, No.3, pp.56 59, J. Guajardo, T. Güneysu, S. Kumar, C. Paar, J. Pelzl. Efficient Hardware Implementation of Finite Fields with Applications to Cryptography, Acta Applicandae Mathematicae: An International Survey Journal on Applying Mathematics and Mathematical Applications, Volume 93, Numbers 1 3, pp , September J. Guajardo, S. Kumar, C. Paar, J. Pelzl. Efficient Software Implementation of Finite Fields with Applications to Cryptography, Acta Applicandae Mathematicae: An International Survey Journal on Applying Mathematics and Mathematical Applications, Volume 93, Numbers 1 3, pp. 3 32, August J.Pelzl, M.Simka, T.Kleinjung, J.Franke, C.Priplata, C.Stahlke, M.Drutarovský, V.Fischer, C.Paar. Area Time Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method. IEE Proceedings Information Security, 152(1):67 78, October T.Wollinger, J.Pelzl, C.Paar. Cantor versus Harley: Optimization and Analysis of Explicit Formulae for Hyperelliptic Curve Cryptosystems. IEEE Transactions on Computers, 54(7): , July T.Wollinger, J.Pelzl, V.Wittelsberger, C.Paar, G.Saldamli, C. K.Koc. Elliptic & Hyperelliptic Curves on Embedded µp. ACM Transactions in Embedded Computing Systems (TECS), 3(3): , August Book Chapter J. Pelzl, Aus dem smarten Leben gegriffen, in Sicherheit im Wandel von Technologien und Märkten, U. Bub, K. Wolfenstetter (Hrsg.), to appear in Springer Verlag, Germany. J. Pelzl, e security 4.0, Sicherheitsmanagement für das Internet der Dinge, in Beherrschbarkeit von Big Data, Cloud Computing und Cyber Security, U. Bub, K. Wolfenstetter (Hrsg.), Springer Verlag, Germany.

2 J. Pelzl, M. Wolf, T. Wollinger, Smart Embedded Platform Automotive, in Secure Smart Embedded Devices, Platforms and Applications, K. Markantonakis, to appear in Springer Verlag, Germany. J. Pelzl, Sicherheit für die Verwaltung eingebetteter Systeme, in IT Sicherheit zwischen Regulierung und Innovation, U. Bub, K. Wolfenstetter (Hrsg.), Vieweg+Teubner, GWV Fachverlag GmbH, 2011, Berlin, Germany. J. Pelzl, IT Sicherheit im Automobil: Existierende Lösungen und neue Ansätze, in Sicherheit und Vertrauen in der mobilen Informations und Kommunikationstechnologie, U. Bub, K. Wolfenstetter (Hrsg.), Vieweg+Teubner, GWV Fachverlag GmbH, 2009, Berlin, Germany. J. Pelzl, T. Wollinger. Security Aspects of Mobile Communication Systems. Chapter in Embedded Security in Cars Securing Current and Future Automotive IT Applications, editors K.Lemke, C.Paar, M.Wolf, Springer Verlag, , ISBN , J.Pelzl, T.Wollinger, C.Paar. Embedded Cryptographic Hardware: Design and Security, chapter Special Hyperelliptic Curve Cryptosystems of Genus Two: Efficient Arithmetic and Fast implementation. Nova Science Publishers, NY, USA, Editor N.Nedjah. Conference Paper C.Paar, J.Pelzl, A.Rupp, K.Schramm, A.Weimerskirch, Securing Green Cars IT Security in Next Generation Electric Vehicle Systems, DACH Security 2009, Bochum, Germany. W. Geiselmann, F. Januszewski, H. Köpfer, J. Pelzl, R. Steinwandt, A Simpler Sieving Device: Combining ECM and TWIRL, 9th International Conference on Information Security and Cryptology ICISC 2006, Busan, Korea, November 30 December 1, 2006, Proceedings. LNCS, Springer Verlag. S. Kumar, C. Paar, J. Pelzl, G. Pfeiffer, M. Schimmler, Breaking Ciphers with COPACOBANA A Cost Optimized Parallel Code Breaker, Cryptographic Hardware and Embedded Systems CHES 2006, 8th International Workshop, Yokohama, Japan, October 10 October 13, 2006, Proceedings. LNCS, Springer Verlag. S.Kumar, C.Paar, J.Pelzl, G.Pfeiffer, M.Schimmler. A Configuration Concept for a Massively Parallel FPGA Architecture. In International Conference on Computer Design CDES'06, Las Vegas, USA, June 26 29, A.Bogdanov, M.Mertens, C.Paar, J.Pelzl, A.Rupp. SMITH A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2). In IEEE Symposium on Field Programmable Custom Computing Machines FCCM 2006, Napa, CA, USA, April 24 26, S.Kumar, C.Paar, J.Pelzl, G.Pfeiffer, M.Schimmler. Breaking Ciphers with COPACOBANA A Cost Optimized Parallel Code Breaker. In IEEE Symposium on Field Programmable Custom Computing Machines FCCM 2006, Napa, CA, USA, April 24 26, Poster summary.

3 S.Kumar, C.Paar, J.Pelzl, G.Pfeiffer, A.Rupp, M.Schimmler. How to Break DES for USD 8,980. In International Workshop on Special Purpose Hardware for Attacking Cryptographic Systems SHARCS'06, Cologne, Germany, April 3 4, T.E. Güneysu, C.Paar, J.Pelzl. On the Security of Elliptic Curve Cryptosystems against Attacks with Special Purpose Hardware. In International Workshop on Special Purpose Hardware for Attacking Cryptographic Systems SHARCS'06, Cologne, Germany, April 3 4, A.Bogdanov, M.Mertens, C.Paar, J.Pelzl, A.Rupp. A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2). In International Workshop on Special Purpose Hardware for Attacking Cryptographic Systems SHARCS'06, Cologne, Germany, April 3 4, J.Franke, T.Kleinjung, C.Paar, J.Pelzl, C.Priplata, C.Stahlke. SHARK A Realizable Special Hardware Sieving Device for Factoring 1024 bit Integers. In JosyulaR. Rao and Berk Sunar, editors, 7th International Workshop on Cryptographic Hardware and Embedded Systems CHES 2005, Edinburgh, UK, volume 3659 of LNCS, pages Springer Verlag, August29 September1, D.N. Amanor, C.Paar, J.Pelzl, V.Bunimov, M.Schimmler. Efficient Hardware Architectures for Modular Multiplication on FPGAs. In 2005 International Conference on Field Programmable Logic and Applications (FPL), Tampere, Finland, pages IEEE Circuits and Systems Society, August 24 26, U. Kaiser, C. Paar, J. Pelzl, D. Rappe, W. Schindler, A. Weimerskirch, T. Wollinger. Auswahlkriterien für kryptographische Algorithmen bei Low Cost RFID Systemen. DACH Security, March 17 18, M.Simka, J.Pelzl, T.Kleinjung, J.Franke, C.Priplata, C.Stahlke, M.Drutarovský, V.Fischer, C.Paar. Hardware Factorization Based on Elliptic Curve Method. In Jeffrey Arnold and KennethL. Pocek, editors, IEEE Symposium on Field Programmable Custom Computing Machines FCCM 2005, Napa, CA, USA, pages , April 18 20, T.Kleinjung, J.Franke, C.Paar, J.Pelzl, C.Priplata, M.Simka, C.Stahlke. An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method. In International Workshop on Special Purpose Hardware for Attacking Cryptographic Systems SHARCS'05, Paris, France, February 24 25, J.Franke, T.Kleinjung, C.Paar, J.Pelzl, C.Priplata, C.Stahlke. SHARK A Realizable Special Hardware Sieving Device for Factoring 1024 bit Integers. In International Workshop on Special Purpose Hardware for Attacking Cryptographic Systems SHARCS'05, Paris, France, February 24 25, S. Baktir, J. Pelzl, T. Wollinger, B. Sunar, C. Paar. Optimal Tower Fields for Hyperelliptic Curve Cryptosystems. 38th Asilomar Conference on Signals, Systems and Computers, November 7 10, 2004, Pacific Grove, USA. J. Pelzl. Arithmetic on Elliptic Curves over GF(2^n). ECC Summer School 2004, (Invited Paper), September 14 16, 2004, Ruhr University Bochum, Germany. J. Pelzl. Hardware Implementation of ECC. ECC Summer School 2004, (Invited Paper), September 14 16, 2004, Ruhr University Bochum, Germany.

4 E.Barteska, J.Pelzl, C.Paar, V.Wittelsberger, T.Wollinger. Case Study: Compiler Comparison for an Embedded Cryptographical Application. In The 2004 International Conference on Embedded Systems and Applications ESA, Las Vegas, USA, June 21 24, J.Pelzl, T.Wollinger, C.Paar. High Performance Arithmetic for Special Hyperelliptic Curve Cryptosystems of Genus Two. In International Conference on Information Technology: Coding and Computing ITCC IEEE Computer Society, April C. Paar, J. Pelzl, K. Schramm, A. Weimerskirch T. Wollinger. Eingebettete Sicherheit: State of the art und zukünftige Entwicklungen, DACH Security, March 30 31, 2004, Basel, Swiss. J.Pelzl, T.Wollinger, J.Guajardo, C.Paar. Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves. In C.D. Walter, C. K.Koc, and C.Paar, editors, International Workshop on Cryptographic Hardware and Embedded Systems CHES 2003, Cologne, Germany, volume 2779 of LNCS, pages Springer Verlag, September 7 10, J.Pelzl, T.Wollinger, C.Paar. Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves. In 10th Annual Workshop on Selected Areas in Cryptography SAC Springer Verlag, Technical Reports L. Batina, N. Mentens, J. Pelzl, C. Priplata, C. Stahlke and F. X. Standaert. Hardware Crackers, ECRYPT European Network of Excellence in Cryptology, (eds.) E. Oswald, 31. July, S. Babbage, D. Catalano, L. Granboulan, A. Lenstra, C. Paar, J. Pelzl, T. Pornin, B. Preneel, M. Robshaw, A. Rupp, N. Smart, M. Ward. Yearly Report on Algorithms and Keysizes (2004), ECRYPT European Network of Excellence in Cryptology, (eds.) C. Gehrmann and M. Näslund, 17. March, C. Paar, J. Pelzl, T. Wollinger. Hyperelliptic Cryptosystems in Practice. 1. Krypto Tag, Mannheim, Gesellschaft für Informatik GI, December, Thesis J.Pelzl, Practical Aspects of Curve Based Cryptography and Cryptanalysis, Dissertation, Department of Electrical Engineering and Information Sciences, Ruhr Universität Bochum, Bochum, Germany, June, J.Pelzl. Hyperelliptic Cryptosystems on Embedded Microprocessor. Master's thesis, Department of Electrical Engineering and Information Sciences, Ruhr Universität Bochum, Bochum, Germany, September Further Contributions and Activities M.Wolf, J.Pelzl, Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts, Avionics Europe Conference, March 21st 22nd 2012, Munich, Germany.

5 J.Pelzl, Absicherung von Geschäftsmodellen im mobilen Handel, 3. thinksmart secure communication for mobile networks, November 6th 7th, 2013, Berlin, Germany. M.Küster, J.Pelzl, Manipulationsschutz vernetzter Sicherheitssysteme durch IT Sicherheit, Workshop, Innosecure Velbert, September 25th 26th, 2013, Velbert/ Heiligenhaus, Germany. J.Pelzl, Program Chair and Technical Organization, IT Sec Industrial Security & Automation, September 23rd 24th, 2013, Essen, Germany. J.Pelzl, Challenges in Embedded Key Management, Omnicard, January 15th 17th, 2013, Berlin, Germany. J.Pelzl, Program Chair and Technical Organization, 2nd Think Smart International Conference on Secure Communication for Energy Networks, November 21th 22th, 2012, Düsseldorf, Germany. J.Pelzl, Program Committee, IT Sec, IT Security Industrial & Automation 2012, November 13th 14th, Dresden, Germany. D.Carluccio, J.Pelzl, IT Sicherheit als Treiber moderner Sicherheitstechnologie, Workshop, Innosecure Velbert, May 23th 24th, 2012, Velbert/ Heiligenhaus, Germany. J.Pelzl, Anforderungen und Lösungen für Sicheres Smart Metering, ConLife 2012, June 28th, 2012, Cologne, Germany. J.Pelzl, Organization and Moderation, Introduction to Industrial Cryptography and IT Security Embedded World Conference, February 28th, 2012, Nuremberg, Germany. J.Pelzl, Organization and Moderation, Workshop on Cryptography and Embedded Security, Embedded World Conference 2011, March 1st, 2011, Nuremberg, Germany. J.Pelzl, Program Chair, escar 2010 Embedded Security in Cars, November 2010, Bremen, Germany. J.Pelzl, Program Comitte, CryptArchi, June 27th 30th, 2010, CNRS conference center, Paris, France. J.Pelzl, Program Comitte, S&D4RCES: International Workshop on Security and Dependability for Resource Constrained Embedded Systems (Secure and dependable RCES by design) in conjunction with SAFECOMP 2010 conference, Vienna, Austria, September 14th, 2010, J.Pelzl, Organization and Moderation, Workshop on Cryptography and Embedded Security, Embedded World Conference 2010, March 2nd, 2010, Nuremberg, Germany. J.Pelzl, T.Wollinger, Workshop on Mobile and Embedded IT Security, Wireless Technologies Kongress 2010, September 22th 23th, Bochum, Germany. J.Pelzl, T.Wollinger, Tutorial IT Security in Mobile Applications, Wireless Congress 2010 Systems & Applications, November 10th 11th, Munich, Germany.

6 J.Pelzl, Moderation and Talk, Wie behalte ich die Kontrolle über meine ausgelieferten Produkte? IHK Forum Mittelstand, December 6th, 2010, Bochum, Germany. J.Pelzl, T.Wollinger, Sicheres Aktivieren von Features und Funktionen für Embedded Systeme, DESIGN&ELEKTRONIK Entwicklerforum Embedded System Entwicklung, October 7th 8th, 2009, Ludwigsburg, Germany. J.Pelzl, T.Wollinger, Eingebettete Sicherheit in der Medizintechnik Ein Überblick, DESIGN&ELEKTRONIK Entwicklerforum Embedded goes medical, September 9th, Leipzig, Germany. A.Osterhues, J.Pelzl, T.Wollinger, Workshop on Embedded Security, 6th Wireless Congress: Systems & Applications, October 21st 22nd, 2009, Munich, Germany. D.Bußmeyer, B.Driessen, A.Osterhues, J.Pelzl, V.Reiß, J.Schwenk, C.Wegener, A Generic Architecture and Extension of ecryptfs: Secret Sharing Scheme, Smartcard Integration and a new Linux Security Module, Linux Kongress 2009, Germany. J.Pelzl, T.Wollinger, Sicherheitsaspekte bei Embedded IT, IM die Fachzeitschrift für Information Management & Consulting, April J.Pelzl, T.Wollinger, Automotive Security: Absicherung des Gesamtsystems Kraftfahrzeug durch eingebettete Hard und Software, IM Die Fachzeitschrift für Information Management & Consulting, March J. Pelzl, T. Wollinger, J. Guajardo and C. Paar, Hyperelliptic Curve Cryptosystems, Closing the Performance Gap to Elliptic Curves. Euler Institute of Discrete Mathematics EIDMA Symposium, PhD Conference, Nov , Carlton De Brug, Mierlo Invited Talks J. Pelzl, Automotive Embedded Security Challenges and Chances, SIAT Symposium on International Automotive Technology January 9th 11th, 2013, Pune, India. J. Pelzl, Schutz vor möglichen Eingriffen und Risiken Vertrauenswürdige Software, 12. EUROFORUM Jahrestagung Software im Automobil, May 14th 15th, 2012, Stuttgart. J. Pelzl, Moderation,TeleTrusT Informationstag 'Das Automobil als IT Sicherheitsfall, May 11th, 2012, Berlin. J. Pelzl, Eingebettete Sicherheit in der Medizintechnik, Anforderungen an IT Sicherheit und Datenschutz bei Medizinprodukten. Nürnberger Medizinproduktekonferenz, TüV Rheinland Nuremberg, Germany, March 22nd, J. Pelzl, Moderation und Program Organization, Cryptography and embedded Security The Workshop, Embedded World Conference, February 2nd, 2012, Nuremberg, Germany. J. Pelzl, Security Requirements for Connected Life, ConLife 2011, June 29th 30th, 2011, Cologne, Germany.

7 J. Pelzl, M. Wolf, Mehr Funktionssicherheit durch IT Sicherheit. 3. EUROFORUM Jahrestagung ''ISO 26262'', September 26th 27th, 2011, Stuttgart, Germany. J. Pelzl, Warum die konventionelle IT Sicherheit für PCs im Automobil nicht funktioniert, MAHREG 11. Innovationsforum 'SICHERER: Trends, Entwicklungen und Projekte für mobile und stationäre Systeme', October 1st, Barleben, Germany. J. Pelzl, Sicherheit für die Verwaltung eingebetteter Systeme, EICT Konferenz IT Sicherheit Vertrauen, Datenschutz, Sicherheit und Innovation, February 10th, 2011, Berlin, Germany. J. Pelzl, IT Sicherheit im Automobil: Existierende Lösungen und neue Ansätze, EICT Konferenz IT Sicherheit Sicherheit und Vertrauen in der mobilen Informations und Kommunikationstechnologie, 2009, Berlin, Germany. J. Pelzl, Cryptanalysis with a cost optimized FPGA cluster, Securing Cyberspace: Application and Foundations of Cryptography and Computer Security, Workshop IV: Special purpose hardware for cryptography: Attacks and Applications, December 4 8, 2006, Institute for Pure and Applied Mathematics (IPAM), University of California, Los Angeles (UCLA). J. Pelzl, Exact Cost Estimates of ECC Attacks with Special Purpose Hardware, The 10th Workshop on Elliptic Curve Cryptography ECC 2006, September 18 20, 2006, The Fields Institute, Toronto, Canada. J. Pelzl, Hardware Implementation of ECC, ECC Summer School 2004, September 16th, 2004, Ruhr University Bochum, Germany. J. Pelzl, Arithmetic on Elliptic Curves over GF(2^n), ECC Summer School 2004, September 14th, 2004, Ruhr University Bochum, Germany.

3. Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis. 4. Algorithms for linear algebra problems over principal ideal rings

3. Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis. 4. Algorithms for linear algebra problems over principal ideal rings 1. Faktorisierung großer Zahlen 2. On smooth ideals in number fields 3. Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis 4. Algorithms for linear algebra problems over principal

More information

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in

More information

Publications by Stefan Lucks

Publications by Stefan Lucks Publications by Stefan Lucks Books and Chapters in Books 1. A. Weimerskirch, D. Westhoff, S. Lucks, E. Zenner, Efficient Pairwise Authentication Protocols for Sensor Networks: Theory and Performance Analysis,

More information

Pervasive Computing und. Informationssicherheit

Pervasive Computing und. Informationssicherheit Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing

More information

Testing Framework for estream Profile II Candidates

Testing Framework for estream Profile II Candidates Testing Framework for estream Profile II Candidates L. Batina 1, S. Kumar 2, J. Lano 1, K. Lemke 2, N. Mentens 1, C. Paar 2, B. Preneel 1, K. Sakiyama 1 and I. Verbauwhede 1 1 Katholieke Universiteit Leuven,

More information

SHARK A Realizable Special Hardware Sieving Device for Factoring 1024-bit Integers

SHARK A Realizable Special Hardware Sieving Device for Factoring 1024-bit Integers SHARK A Realizable Special Hardware Sieving Device for Factoring 1024-bit Integers Jens Franke 1, Thorsten Kleinjung 1, Christof Paar 2, Jan Pelzl 2, Christine Priplata 3, Colin Stahlke 3 1 University

More information

Lightweight Cryptography From an Engineers Perspective

Lightweight Cryptography From an Engineers Perspective Lightweight Cryptography From an Engineers Perspective ECC 2007 Acknowledgement Christof Paar A. Bogdanov, L. Knudsen, G. Leander, M. Robshaw, Y. Seurin, C. Vikkelsoe S. Kumar 2 Outline Motivation Hardware

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method

An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method Jens Franke 1, Thorsten Kleinjung 1, Christof Paar 2, Jan Pelzl 2, Christine Priplata 3, Martin Šimka4, Colin Stahlke

More information

C U R R I C U L U M V I T A E T R I V A N L E

C U R R I C U L U M V I T A E T R I V A N L E C U R R I C U L U M V I T A E T R I V A N L E Department of Computer Science, 253 Love Building Florida State University, Tallahassee, Florida 32306-4530, USA. Phone: (850) 345-6468, Fax: (850) 644-0058.

More information

Mobile Network Security Technology Research Center Kyungpook National University

Mobile Network Security Technology Research Center Kyungpook National University The sprit of Truth, Pride, and Service Mobile Network Security Technology Research Center Kyungpook National University June 2006 History June, 2000 August, 2000 Applied for the University Information

More information

Cryptography & Network-Security: Implementations in Hardware

Cryptography & Network-Security: Implementations in Hardware Kris Gaj joined ECE GMU in Fall 1998 Cryptography & Network-Security: Implementations in Hardware http://ece.gmu.edu/crypto-text.htm 6 Ph.D. Students Pawel Chodowiec Charikleia Zouridaki Chang Shu Sashisu

More information

Multi-Layered Cryptographic Processor for Network Security

Multi-Layered Cryptographic Processor for Network Security International Journal of Scientific and Research Publications, Volume 2, Issue 10, October 2012 1 Multi-Layered Cryptographic Processor for Network Security Pushp Lata *, V. Anitha ** * M.tech Student,

More information

ECC is Ready for RFID A Proof in Silicon

ECC is Ready for RFID A Proof in Silicon ECC is Ready for RFID A Proof in Silicon RFIDsec 08 Presentation Daniel Hein, daniel.hein@gmx.at Johannes Wolkerstorfer, Johannes.Wolkerstorfer@iaik.tugraz.at Norbert Felber, felber@iis.ee.ethz.ch 1 Outline

More information

Security and Privacy in Big Data, Blessing or Curse?

Security and Privacy in Big Data, Blessing or Curse? Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology

More information

Area time efficient hardware architecture for factoring integers with the elliptic curve method

Area time efficient hardware architecture for factoring integers with the elliptic curve method Area time efficient hardware architecture for factoring integers with the elliptic curve method Jan Pelzl, Martin Šimka, Thorsten Kleinjung, Jens Franke, Christine Priplata, Colin Stahlke, Miloš Drutarovský,

More information

Curriculum Vitae. Personal data Date of birth: 1969-09-24 Place of birth: Nordhausen (Thuringia, Germany) Marital status: single

Curriculum Vitae. Personal data Date of birth: 1969-09-24 Place of birth: Nordhausen (Thuringia, Germany) Marital status: single Curriculum Vitae Dr. Torsten Schütze Sturmfederstr. 26 D-74388 Talheim, Germany Phone: +49 71 33 / 1 83 76 50 Mobile Phone: +49 1 73 / 6 51 45 22 E-Mail: torsten.schuetze@rohde-schwarz.com torsten.schuetze@gmx.net

More information

Cryptanalysis with a cost-optimized FPGA cluster

Cryptanalysis with a cost-optimized FPGA cluster Cryptanalysis with a cost-optimized FPGA cluster Jan Pelzl, Horst Görtz Institute for IT-Security, Germany UCLA IPAM Workshop IV Special Purpose Hardware for Cryptography: Attacks and Applications December

More information

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch 1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

Vehicular Security Hardware The Security for Vehicular Security Mechanisms escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security

More information

UNIVERSITÄTSBIBLIOTHEK

UNIVERSITÄTSBIBLIOTHEK UNIVERSITÄTSBLIOTHEK Zeitschriften im Abonnement Fach: Informatik : Elektronische Zeitschriften finden Sie in der Elektronischen Zeitschriftenbibliothek EZB. Standort : Bereichsbibliothek Informatik Standort

More information

Hardware Implementation of AES Encryption and Decryption System Based on FPGA

Hardware Implementation of AES Encryption and Decryption System Based on FPGA Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based

More information

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,

More information

Public Key Cryptography. Performance Comparison and Benchmarking

Public Key Cryptography. Performance Comparison and Benchmarking Public Key Cryptography Performance Comparison and Benchmarking Tanja Lange Department of Mathematics Technical University of Denmark tanja@hyperelliptic.org 28.08.2006 Tanja Lange Benchmarking p. 1 What

More information

Introduction to Embedded Systems

Introduction to Embedded Systems Introduction to Embedded Systems Part 1: Introduction 1. What is an embedded system? 2. Product and production automation 3. Preview: technology and programming languages Introduction to Embedded Systems

More information

http://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus

http://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus Christos Kyrkou, PhD KIOS Research Center for Intelligent Systems and Networks, Department of Electrical and Computer Engineering, University of Cyprus, Tel:(+357)99569478, email: ckyrkou@gmail.com Education

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

Paolo Maistri. September 8, 2008. Personal Information 2. Education and Studies 2. Academic Activities and Affiliations 3

Paolo Maistri. September 8, 2008. Personal Information 2. Education and Studies 2. Academic Activities and Affiliations 3 CURRICULUM VITAE ET STUDIORUM Paolo Maistri September 8, 2008 TABLE OF CONTENTS Personal Information 2 Education and Studies 2 Academic Activities and Affiliations 3 Teaching Activities 4 Teaching Assistance......................................

More information

CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice

CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice THIRD EDITION William Stallings Prentice Hall Pearson Education International CONTENTS CHAPTER 1 OVERVIEW 1 1.1 1.2 1.3 1.4 1.5 1.6 PART ONE CHAPTER

More information

Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware

Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware Giacomo de Meulenaer, François Gosset, Guerric Meurice de Dormale, Jean-Jacques Quisquater UCL/DICE

More information

Challenge of Ethernet Use in the Automobile

Challenge of Ethernet Use in the Automobile Challenge of Ethernet Use in the Automobile Flexible interfaces and software tools simplify ECU development Already this year, Ethernet will be used as a system network in the first production vehicles.

More information

FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION Abstract In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be

More information

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst. Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.edu Overview Cryptanalysis Challenge Encryption: DES AES Message

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

Dr. Shashank Srivastava. Contact. E-mail: shashank12@mnnit.ac.in. Telephone: 0532-2271365. Teaching. Courses Taught: Current Courses: Past Courses:

Dr. Shashank Srivastava. Contact. E-mail: shashank12@mnnit.ac.in. Telephone: 0532-2271365. Teaching. Courses Taught: Current Courses: Past Courses: Dr. Shashank Srivastava Assistant Professor Department of Computer Science & Engineering Image Processing Department Building-First Floor Motilal Nehru National Institute of Technology Allahabad-211004,

More information

Information & Communication Security (SS 15)

Information & Communication Security (SS 15) Information & Communication Security (SS 15) Electronic Signatures Dr. Jetzabel Serna-Olvera @sernaolverajm Chair of Mobile Business & Multilateral Security Goethe University Frankfurt www.m-chair.de Agenda

More information

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies Alaa_hamami@yahoo.com Dr. Mohammad Alaa Al-

More information

Conference Proceedings and Journal Publications

Conference Proceedings and Journal Publications There are no translations available. Conference Proceedings and Journal Publications 2011 - Neumann, R.; Georieva, K.; Dumke, R.; Schmietendorf, A.: Reverse Commerce - Adding Information System Support

More information

Evaluating The Performance of Symmetric Encryption Algorithms

Evaluating The Performance of Symmetric Encryption Algorithms International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,

More information

Cyber-Physical Systems, Internet of Things & Industry 4.0 First Technical Prototypes

Cyber-Physical Systems, Internet of Things & Industry 4.0 First Technical Prototypes Cyber-Physical Systems, Internet of Things & Industry 4.0 First Technical Prototypes Johannes Schöning Munich, Germany 10/2013 London Münster Berlin Köln Hasselt Saarbrücken Innovative Retail Lab (IRL)

More information

1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.

1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics. Curriculum Vitae Vassilis Zikas Postdoctoral Researcher, UCLA University of California, Los Angeles Los Angeles, CA 90095-1596 +1 (424) 781-7942 vzikas@cs.ucla.edu www.cs.ucla.edu/~vzikas Education 2006

More information

Trends in der Forschung für kontaktlose Anwendungen

Trends in der Forschung für kontaktlose Anwendungen Trends in der Forschung für kontaktlose Anwendungen 8. Dresdner RFID Symposium 4. 5. 12. 2014; Dresden, Deutschland Holger Bock, Infineon Technologies Austria AG Überblick Einleitung CATRENE-Projekt NewP@ss

More information

A blind digital signature scheme using elliptic curve digital signature algorithm

A blind digital signature scheme using elliptic curve digital signature algorithm A blind digital signature scheme using elliptic curve digital signature algorithm İsmail BÜTÜN * and Mehmet DEMİRER *Department of Electrical Engineering, University of South Florida, Tampa, FL, USA Department

More information

Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker

Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker Sandeep Kumar 1, Christof Paar 1, Jan Pelzl 1, Gerd Pfeiffer 2, and Manfred Schimmler 2 1 Horst Görtz Institute for IT Security,

More information

Requirements Engineering on the Transition to Product and Innovation Management

Requirements Engineering on the Transition to Product and Innovation Management Requirements Engineering on the Transition to Product and Innovation Management The Innovation Perspective Dipl.-Ing. Dr. techn. Mario Pichler ++43 7236 3343 898 mario.pichler@scch.at www.scch.at Technologies

More information

MEMBERSHIPS Amt24 APAN ARTEMIS AUTOSAR Berliner Wirtschaftsgespräche e. V. BITKOM Working Groups and Committees Federal Government of Germany

MEMBERSHIPS Amt24 APAN ARTEMIS AUTOSAR Berliner Wirtschaftsgespräche e. V. BITKOM Working Groups and Committees Federal Government of Germany MEMBERSHIPS Amt24 - Effiziente Lösungen für die moderne Verwaltung APAN - Asia Pacific Advanced Network ARTEMIS Industry Association - Autonomic Communication Forum AUTOSAR - Car2Car Communication Consortium

More information

Applied and Integrated Security. C. Eckert

Applied and Integrated Security. C. Eckert Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass

More information

Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security

Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität

More information

Software Construction

Software Construction Software Construction Staff Faculty: Univ.-Prof. Dr. rer. nat. Horst Lichter lichter@informatik.rwth-aachen.de Secretary: Bärbel Kronewetter Phone: +49 241 80 21 330 Fax: +49 241 80 22 352 Research Assistants:

More information

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn

More information

Vertrauen in Cloud Dienste schaffen

Vertrauen in Cloud Dienste schaffen Vertrauen in Cloud Dienste schaffen Symantec Übersicht Thomas Hemker, CISSP Security Strategist Thomas Hemker 18 Jahre IT Security Security CTO Team CISO Kontakt Beratung CISSP Security Strategist Thomas_hemker@symantec.com

More information

for High Performance Computing

for High Performance Computing Technische Universität München Institut für Informatik Lehrstuhl für Rechnertechnik und Rechnerorganisation Automatic Performance Engineering Workflows for High Performance Computing Ventsislav Petkov

More information

SPICE auf der Überholspur. Vergleich von ISO (TR) 15504 und Automotive SPICE

SPICE auf der Überholspur. Vergleich von ISO (TR) 15504 und Automotive SPICE SPICE auf der Überholspur Vergleich von ISO (TR) 15504 und Automotive SPICE Historie Software Process Improvement and Capability determination 1994 1995 ISO 15504 Draft SPICE wird als Projekt der ISO zur

More information

NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS

NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS André Groll, Jan Holle University of Siegen, Institute for Data Communications Systems {andre.groll,jan.holle}@uni-siegen.de

More information

University of Münster, Institute of Political Science, Scharnhorststraße 100, 48151 Münster, Germany. Email: thomas.dietz@uni-muenster.

University of Münster, Institute of Political Science, Scharnhorststraße 100, 48151 Münster, Germany. Email: thomas.dietz@uni-muenster. Professor Dr. Thomas Dietz University of Münster, Institute of Political Science, Scharnhorststraße 100, 48151 Münster, Germany Email: thomas.dietz@uni-muenster.de CURRENT POSITION University of Münster,

More information

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique

More information

Michael Schulte-Mecklenbeck

Michael Schulte-Mecklenbeck Michael Schulte-Mecklenbeck, Ph.D. Columbia Business School 3022 Broadway Uris Hall 5M New York, NY 10027 USA michael@schulte-mecklenbeck.com www.schulte-mecklenbeck.com Curriculum Vitae Michael Schulte-Mecklenbeck

More information

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager About our Cryptographic and Security Testing Laboratory Bringing together a suite of conformance testing

More information

An Instruction Set Extension for Fast and Memory-Efficient AES Implementation

An Instruction Set Extension for Fast and Memory-Efficient AES Implementation An Instruction Set Extension for Fast and Memory-Efficient AES Implementation Stefan Tillich, Johann Großschädl, and Alexander Szekely Graz University of Technology Institute for Applied Information Processing

More information

Jannes Rauch Current Position Education Relevant Positions

Jannes Rauch Current Position Education Relevant Positions Jannes Rauch Master of Science (Finance) University of Cologne Faculty of Management, Economics and Social Sciences Department of Risk Management and Insurance Kerpener Strasse 30 50937 Cologne, Germany

More information

benefits for me Secure and efficient card acceptance and card payments. Postbank P.O.S. Transact

benefits for me Secure and efficient card acceptance and card payments. Postbank P.O.S. Transact benefits for me Secure and efficient card acceptance and card payments. Postbank P.O.S. Transact What we do Cashless payment in the form of card transactions has become an indispensable part of point-of-sale

More information

Walter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this field.

Walter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this field. 27, IT Security Techniques An Interview with Walter Fumy, Chairman of ISO/IEC JTC 1/SC Walter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this

More information

Implementation and Design of AES S-Box on FPGA

Implementation and Design of AES S-Box on FPGA International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 232-9364, ISSN (Print): 232-9356 Volume 3 Issue ǁ Jan. 25 ǁ PP.9-4 Implementation and Design of AES S-Box on FPGA Chandrasekhar

More information

Lean Innovation. A Fast Path from Knowledge to Value. Bearbeitet von Claus Sehested, Henrik Sonnenberg

Lean Innovation. A Fast Path from Knowledge to Value. Bearbeitet von Claus Sehested, Henrik Sonnenberg Lean Innovation A Fast Path from Knowledge to Value Bearbeitet von Claus Sehested, Henrik Sonnenberg 1st Edition. 2010. Buch. x, 192 S. Hardcover ISBN 978 3 642 15894 0 Format (B x L): 15,5 x 23,5 cm Gewicht:

More information

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering

More information

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM NABI ET AL: IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM 28 IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM Mohammad Noor

More information

Model-based Analysis of Infrastructure Projects and Market Integration in the Region of South-South Eastern Europe

Model-based Analysis of Infrastructure Projects and Market Integration in the Region of South-South Eastern Europe Institute of Energy Economics at the University of Cologne Model-based Analysis of Infrastructure Projects and Market Integration in the Region of South-South Eastern Europe Stefan Lochner Project Proposal

More information

Research Article. ISSN 2347-9523 (Print) *Corresponding author Shi-hai Zhu Email:

Research Article. ISSN 2347-9523 (Print) *Corresponding author Shi-hai Zhu Email: Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(3A):352-357 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)

More information

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Overview on Activities Related to Academic Utilization Contributors: Cassidian

More information

Dr. Anna Maria Schneider

Dr. Anna Maria Schneider Dr. Anna Maria Schneider Postdoctoral Researcher Faculty of Economics and Business Administration Humboldt Universität zu Berlin Rosenstraße 19 10178 Berlin, Germany anna maria.schneider[at]wiwi.hu berlin.de

More information

Cyber Security Practical considerations for implementing IEC 62351

Cyber Security Practical considerations for implementing IEC 62351 1. Introduction Cyber Security Practical considerations for implementing IEC 62351 Frank Hohlbaum, Markus Braendle, Fernando Alvarez ABB frank.hohlbaum@ch.abb.com Switzerland Two trends are currently changing

More information

Embedded Software Development and Test in 2011 using a mini- HIL approach

Embedded Software Development and Test in 2011 using a mini- HIL approach Primoz Alic, isystem, Slovenia Erol Simsek, isystem, Munich Embedded Software Development and Test in 2011 using a mini- HIL approach Kurzfassung Dieser Artikel beschreibt den grundsätzlichen Aufbau des

More information

CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography

CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography 28. Februar 2008 Alexander Klimm, Oliver Sander, Jürgen Becker Institut für Technik der Informationsverarbeitung Sylvain

More information

EMBEDDING DEGREE OF HYPERELLIPTIC CURVES WITH COMPLEX MULTIPLICATION

EMBEDDING DEGREE OF HYPERELLIPTIC CURVES WITH COMPLEX MULTIPLICATION EMBEDDING DEGREE OF HYPERELLIPTIC CURVES WITH COMPLEX MULTIPLICATION CHRISTIAN ROBENHAGEN RAVNSHØJ Abstract. Consider the Jacobian of a genus two curve defined over a finite field and with complex multiplication.

More information

CURRICULUM VITÆ RICARDO CHAVES. December - 2008

CURRICULUM VITÆ RICARDO CHAVES. December - 2008 CURRICULUM VITÆ RICARDO CHAVES December - 2008 PERSONAL DETAILS Full Name: Ricardo Jorge Fernandes Chaves Date of Birth: December 25 th, 1977 Nationality: Portuguese RESEARCH AND TEACHIN G INTERESTS -

More information

ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDS

ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDS ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDS D. Sravana Kumar 1 CH. Suneetha 2 A. ChandrasekhAR 3 1 Reader in Physics, SVLNS Government College, Bheemunipatnam, Visakhapatnam Dt., India skdharanikota@gmail.com

More information

A Factoring and Discrete Logarithm based Cryptosystem

A Factoring and Discrete Logarithm based Cryptosystem Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques

More information

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

Design and Implementation of Asymmetric Cryptography Using AES Algorithm Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,

More information

Systems Engineering. Aim. Dr Peter Jones. Degree Course Leader

Systems Engineering. Aim. Dr Peter Jones. Degree Course Leader Systems Engineering Dr Peter Jones Degree Course Leader Aim Systems Engineering Course Structure: BEng Course Structure: MEng Electives Taking a Year Out PDR Professional Accreditation 1 Systems Engineering

More information

User-centered Requirements Elicitation for Business Intelligence Solutions

User-centered Requirements Elicitation for Business Intelligence Solutions User-centered Requirements Elicitation for Business Intelligence Solutions Hendrik Meth and Alexander Mädche University of Mannheim Chair of Information Systems IV - Enterprise Information Systems 68131

More information

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD TÜV Rheinland Nederland B.V. Version 20101101 Certification Report NXP Secure Smart Card Controller P40C012/040/072 VD Sponsor and developer: NXP Semiconductors Germany GmbH, Business Unit Identification

More information

Risikomanagement mit der Success Driver Analyse (SDA) - Erfahrungen bei Grossprojekten und Programmen

Risikomanagement mit der Success Driver Analyse (SDA) - Erfahrungen bei Grossprojekten und Programmen Risikomanagement mit der Success Driver Analyse (SDA) - Erfahrungen bei Grossprojekten und Programmen Dr. Ernest Wallmüller QUALITÄT & INFORMATIK Zürich, München, Wien www.itq.ch Dr. E. Wallmüller 1 Qualität

More information

Zukang Shen Home Address: Work: 214-480-3198 707 Kindred Lane Cell: 512-619-7927

Zukang Shen Home Address: Work: 214-480-3198 707 Kindred Lane Cell: 512-619-7927 Zukang Shen Home Address: Work: 214-480-3198 707 Kindred Lane Cell: 512-619-7927 Richardson, TX 75080 Email: zukang.shen@ti.com Education: The University of Texas, Austin, TX, USA Jun. 2003 May 2006 Ph.D.,

More information

Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography

Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography Anca Nitulescu PhD Student Personal information Address: Ecole Normale Supérieure, DI Paris, France Email: anca.nitulescu@ens.fr Occupational field Cryptography: Provable Security for Protocols I have

More information

Implementing Network Security Protocols

Implementing Network Security Protocols Implementing Network Security Protocols based on Elliptic Curve Cryptography M. Aydos, E. Savaş, and Ç. K. Koç Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331, USA {aydos,savas,koc}@ece.orst.edu

More information

1986-1988 Assistent of Management "Gesellschaft für wissenschaftliche Gesprächspsychotherapie e.v.", Köln

1986-1988 Assistent of Management Gesellschaft für wissenschaftliche Gesprächspsychotherapie e.v., Köln Biography 6. 3 1960 born in Düsseldorf, Germany 1979-1986 Studies at the University Cologne Degree in Psychology 1986-1988 Assistent of Management "Gesellschaft für wissenschaftliche Gesprächspsychotherapie

More information

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646 646 and Computer Network Security Course web page: web page Courses 646 Kris Gaj Research and teaching interests: cryptography network security computer arithmetic FPGA & ASIC design and testing Contact:

More information

Martino Sykora CURRICULUM VITAE ET STUDIORUM

Martino Sykora CURRICULUM VITAE ET STUDIORUM Martino Sykora CURRICULUM VITAE ET STUDIORUM Via L. Pasteur, 15 20127 Milano Italy Mob: +39 338 1983694 Mail: martino.sykora@gmail.com Personal Information Birthdate: June 15th, 1978 Birthplace: Basel,

More information

Security System in Cloud Computing for Medical Data Usage

Security System in Cloud Computing for Medical Data Usage , pp.27-31 http://dx.doi.org/10.14257/astl.2013.38.06 Security System in Cloud Computing for Medical Data Usage Maya Louk 1, Hyotaek Lim 2, Hoon Jae Lee 3 1 Department of Ubiquitous IT, Graduate School

More information

Mediacenter / Das Informations-, Kommunikations- und Medienzentrum (ICMC / IKMZ) of Brandenburg Technical University of Cottbus

Mediacenter / Das Informations-, Kommunikations- und Medienzentrum (ICMC / IKMZ) of Brandenburg Technical University of Cottbus The Information-, Communication- and Mediacenter / Das Informations-, Kommunikations- und (ICMC / IKMZ) of Brandenburg Technical University of Cottbus Seminar of the LIBER Architecture Group Session 7-24

More information

Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing

Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing 322 The International Arab Journal of Information Technology, Vol. 11, No. 4, July 2014 Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing

More information

Security concept for gateway integrity protection within German smart grids

Security concept for gateway integrity protection within German smart grids ASE 2014, ECSaR-Workshop Security concept for gateway integrity protection within German smart grids Prof. Dr. Kai-Oliver Detken 1, Carl-Heinz Genzel 2, Olav Hoffmann 3, Prof. Dr. Richard Sethmann 4 1

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

Curriculum Vitae. 02/2003 Doctoral Degree from the University of Kassel: Dr. rer. pol. (summa cum laude).

Curriculum Vitae. 02/2003 Doctoral Degree from the University of Kassel: Dr. rer. pol. (summa cum laude). Curriculum Vitae Jörg Lingens Address Hollandtstr. 61 48161 Münster Phone (Office): +49-251-83.22923 Email: Joerg.Lingens@wiwi.uni-muenster.de Personal Details Gender: Male Date of birth: 4th of November,

More information

µfup: A Software Development Process for Embedded Systems

µfup: A Software Development Process for Embedded Systems µfup: A Software Development Process for Embedded Systems Leif Geiger, Jörg Siedhof, Albert Zündorf University of Kassel, Software Engineering Research Group, Department of Computer Science and Electrical

More information

Certifying Energy Efficiency of Android Applications

Certifying Energy Efficiency of Android Applications Proceedings of the 28th EnviroInfo 2014 Conference, Oldenburg, Germany September 10-12, 2014 Certifying Energy Efficiency of Android Applications Johannes Meier 1, Marie-Christin Ostendorp 1, Jan Jelschen

More information