Publications list of Jan Pelzl

Size: px
Start display at page:

Download "Publications list of Jan Pelzl"

Transcription

1 Publications list of Jan Pelzl (December 2014) Books C. Paar, J. Pelzl, Understanding Cryptography A Textbook for Students and Practicioners, Springer Verlag, ISBN , December, J.Pelzl, Practical Aspects of Curve Based Cryptography and Cryptanalysis, Europäischer Universitätsverlag, ISBN , June, Journal Paper A.Weimerskirch, T.Wollinger, J.Pelzl, K.Schramm, Data in Transit, Thinking Highways, Vol.4, No.3, pp.56 59, J. Guajardo, T. Güneysu, S. Kumar, C. Paar, J. Pelzl. Efficient Hardware Implementation of Finite Fields with Applications to Cryptography, Acta Applicandae Mathematicae: An International Survey Journal on Applying Mathematics and Mathematical Applications, Volume 93, Numbers 1 3, pp , September J. Guajardo, S. Kumar, C. Paar, J. Pelzl. Efficient Software Implementation of Finite Fields with Applications to Cryptography, Acta Applicandae Mathematicae: An International Survey Journal on Applying Mathematics and Mathematical Applications, Volume 93, Numbers 1 3, pp. 3 32, August J.Pelzl, M.Simka, T.Kleinjung, J.Franke, C.Priplata, C.Stahlke, M.Drutarovský, V.Fischer, C.Paar. Area Time Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method. IEE Proceedings Information Security, 152(1):67 78, October T.Wollinger, J.Pelzl, C.Paar. Cantor versus Harley: Optimization and Analysis of Explicit Formulae for Hyperelliptic Curve Cryptosystems. IEEE Transactions on Computers, 54(7): , July T.Wollinger, J.Pelzl, V.Wittelsberger, C.Paar, G.Saldamli, C. K.Koc. Elliptic & Hyperelliptic Curves on Embedded µp. ACM Transactions in Embedded Computing Systems (TECS), 3(3): , August Book Chapter J. Pelzl, Aus dem smarten Leben gegriffen, in Sicherheit im Wandel von Technologien und Märkten, U. Bub, K. Wolfenstetter (Hrsg.), to appear in Springer Verlag, Germany. J. Pelzl, e security 4.0, Sicherheitsmanagement für das Internet der Dinge, in Beherrschbarkeit von Big Data, Cloud Computing und Cyber Security, U. Bub, K. Wolfenstetter (Hrsg.), Springer Verlag, Germany.

2 J. Pelzl, M. Wolf, T. Wollinger, Smart Embedded Platform Automotive, in Secure Smart Embedded Devices, Platforms and Applications, K. Markantonakis, to appear in Springer Verlag, Germany. J. Pelzl, Sicherheit für die Verwaltung eingebetteter Systeme, in IT Sicherheit zwischen Regulierung und Innovation, U. Bub, K. Wolfenstetter (Hrsg.), Vieweg+Teubner, GWV Fachverlag GmbH, 2011, Berlin, Germany. J. Pelzl, IT Sicherheit im Automobil: Existierende Lösungen und neue Ansätze, in Sicherheit und Vertrauen in der mobilen Informations und Kommunikationstechnologie, U. Bub, K. Wolfenstetter (Hrsg.), Vieweg+Teubner, GWV Fachverlag GmbH, 2009, Berlin, Germany. J. Pelzl, T. Wollinger. Security Aspects of Mobile Communication Systems. Chapter in Embedded Security in Cars Securing Current and Future Automotive IT Applications, editors K.Lemke, C.Paar, M.Wolf, Springer Verlag, , ISBN , J.Pelzl, T.Wollinger, C.Paar. Embedded Cryptographic Hardware: Design and Security, chapter Special Hyperelliptic Curve Cryptosystems of Genus Two: Efficient Arithmetic and Fast implementation. Nova Science Publishers, NY, USA, Editor N.Nedjah. Conference Paper C.Paar, J.Pelzl, A.Rupp, K.Schramm, A.Weimerskirch, Securing Green Cars IT Security in Next Generation Electric Vehicle Systems, DACH Security 2009, Bochum, Germany. W. Geiselmann, F. Januszewski, H. Köpfer, J. Pelzl, R. Steinwandt, A Simpler Sieving Device: Combining ECM and TWIRL, 9th International Conference on Information Security and Cryptology ICISC 2006, Busan, Korea, November 30 December 1, 2006, Proceedings. LNCS, Springer Verlag. S. Kumar, C. Paar, J. Pelzl, G. Pfeiffer, M. Schimmler, Breaking Ciphers with COPACOBANA A Cost Optimized Parallel Code Breaker, Cryptographic Hardware and Embedded Systems CHES 2006, 8th International Workshop, Yokohama, Japan, October 10 October 13, 2006, Proceedings. LNCS, Springer Verlag. S.Kumar, C.Paar, J.Pelzl, G.Pfeiffer, M.Schimmler. A Configuration Concept for a Massively Parallel FPGA Architecture. In International Conference on Computer Design CDES'06, Las Vegas, USA, June 26 29, A.Bogdanov, M.Mertens, C.Paar, J.Pelzl, A.Rupp. SMITH A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2). In IEEE Symposium on Field Programmable Custom Computing Machines FCCM 2006, Napa, CA, USA, April 24 26, S.Kumar, C.Paar, J.Pelzl, G.Pfeiffer, M.Schimmler. Breaking Ciphers with COPACOBANA A Cost Optimized Parallel Code Breaker. In IEEE Symposium on Field Programmable Custom Computing Machines FCCM 2006, Napa, CA, USA, April 24 26, Poster summary.

3 S.Kumar, C.Paar, J.Pelzl, G.Pfeiffer, A.Rupp, M.Schimmler. How to Break DES for USD 8,980. In International Workshop on Special Purpose Hardware for Attacking Cryptographic Systems SHARCS'06, Cologne, Germany, April 3 4, T.E. Güneysu, C.Paar, J.Pelzl. On the Security of Elliptic Curve Cryptosystems against Attacks with Special Purpose Hardware. In International Workshop on Special Purpose Hardware for Attacking Cryptographic Systems SHARCS'06, Cologne, Germany, April 3 4, A.Bogdanov, M.Mertens, C.Paar, J.Pelzl, A.Rupp. A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2). In International Workshop on Special Purpose Hardware for Attacking Cryptographic Systems SHARCS'06, Cologne, Germany, April 3 4, J.Franke, T.Kleinjung, C.Paar, J.Pelzl, C.Priplata, C.Stahlke. SHARK A Realizable Special Hardware Sieving Device for Factoring 1024 bit Integers. In JosyulaR. Rao and Berk Sunar, editors, 7th International Workshop on Cryptographic Hardware and Embedded Systems CHES 2005, Edinburgh, UK, volume 3659 of LNCS, pages Springer Verlag, August29 September1, D.N. Amanor, C.Paar, J.Pelzl, V.Bunimov, M.Schimmler. Efficient Hardware Architectures for Modular Multiplication on FPGAs. In 2005 International Conference on Field Programmable Logic and Applications (FPL), Tampere, Finland, pages IEEE Circuits and Systems Society, August 24 26, U. Kaiser, C. Paar, J. Pelzl, D. Rappe, W. Schindler, A. Weimerskirch, T. Wollinger. Auswahlkriterien für kryptographische Algorithmen bei Low Cost RFID Systemen. DACH Security, March 17 18, M.Simka, J.Pelzl, T.Kleinjung, J.Franke, C.Priplata, C.Stahlke, M.Drutarovský, V.Fischer, C.Paar. Hardware Factorization Based on Elliptic Curve Method. In Jeffrey Arnold and KennethL. Pocek, editors, IEEE Symposium on Field Programmable Custom Computing Machines FCCM 2005, Napa, CA, USA, pages , April 18 20, T.Kleinjung, J.Franke, C.Paar, J.Pelzl, C.Priplata, M.Simka, C.Stahlke. An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method. In International Workshop on Special Purpose Hardware for Attacking Cryptographic Systems SHARCS'05, Paris, France, February 24 25, J.Franke, T.Kleinjung, C.Paar, J.Pelzl, C.Priplata, C.Stahlke. SHARK A Realizable Special Hardware Sieving Device for Factoring 1024 bit Integers. In International Workshop on Special Purpose Hardware for Attacking Cryptographic Systems SHARCS'05, Paris, France, February 24 25, S. Baktir, J. Pelzl, T. Wollinger, B. Sunar, C. Paar. Optimal Tower Fields for Hyperelliptic Curve Cryptosystems. 38th Asilomar Conference on Signals, Systems and Computers, November 7 10, 2004, Pacific Grove, USA. J. Pelzl. Arithmetic on Elliptic Curves over GF(2^n). ECC Summer School 2004, (Invited Paper), September 14 16, 2004, Ruhr University Bochum, Germany. J. Pelzl. Hardware Implementation of ECC. ECC Summer School 2004, (Invited Paper), September 14 16, 2004, Ruhr University Bochum, Germany.

4 E.Barteska, J.Pelzl, C.Paar, V.Wittelsberger, T.Wollinger. Case Study: Compiler Comparison for an Embedded Cryptographical Application. In The 2004 International Conference on Embedded Systems and Applications ESA, Las Vegas, USA, June 21 24, J.Pelzl, T.Wollinger, C.Paar. High Performance Arithmetic for Special Hyperelliptic Curve Cryptosystems of Genus Two. In International Conference on Information Technology: Coding and Computing ITCC IEEE Computer Society, April C. Paar, J. Pelzl, K. Schramm, A. Weimerskirch T. Wollinger. Eingebettete Sicherheit: State of the art und zukünftige Entwicklungen, DACH Security, March 30 31, 2004, Basel, Swiss. J.Pelzl, T.Wollinger, J.Guajardo, C.Paar. Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves. In C.D. Walter, C. K.Koc, and C.Paar, editors, International Workshop on Cryptographic Hardware and Embedded Systems CHES 2003, Cologne, Germany, volume 2779 of LNCS, pages Springer Verlag, September 7 10, J.Pelzl, T.Wollinger, C.Paar. Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves. In 10th Annual Workshop on Selected Areas in Cryptography SAC Springer Verlag, Technical Reports L. Batina, N. Mentens, J. Pelzl, C. Priplata, C. Stahlke and F. X. Standaert. Hardware Crackers, ECRYPT European Network of Excellence in Cryptology, (eds.) E. Oswald, 31. July, S. Babbage, D. Catalano, L. Granboulan, A. Lenstra, C. Paar, J. Pelzl, T. Pornin, B. Preneel, M. Robshaw, A. Rupp, N. Smart, M. Ward. Yearly Report on Algorithms and Keysizes (2004), ECRYPT European Network of Excellence in Cryptology, (eds.) C. Gehrmann and M. Näslund, 17. March, C. Paar, J. Pelzl, T. Wollinger. Hyperelliptic Cryptosystems in Practice. 1. Krypto Tag, Mannheim, Gesellschaft für Informatik GI, December, Thesis J.Pelzl, Practical Aspects of Curve Based Cryptography and Cryptanalysis, Dissertation, Department of Electrical Engineering and Information Sciences, Ruhr Universität Bochum, Bochum, Germany, June, J.Pelzl. Hyperelliptic Cryptosystems on Embedded Microprocessor. Master's thesis, Department of Electrical Engineering and Information Sciences, Ruhr Universität Bochum, Bochum, Germany, September Further Contributions and Activities M.Wolf, J.Pelzl, Airborne Stuxnet? IT Security Threats for Modern Computerized Aircrafts, Avionics Europe Conference, March 21st 22nd 2012, Munich, Germany.

5 J.Pelzl, Absicherung von Geschäftsmodellen im mobilen Handel, 3. thinksmart secure communication for mobile networks, November 6th 7th, 2013, Berlin, Germany. M.Küster, J.Pelzl, Manipulationsschutz vernetzter Sicherheitssysteme durch IT Sicherheit, Workshop, Innosecure Velbert, September 25th 26th, 2013, Velbert/ Heiligenhaus, Germany. J.Pelzl, Program Chair and Technical Organization, IT Sec Industrial Security & Automation, September 23rd 24th, 2013, Essen, Germany. J.Pelzl, Challenges in Embedded Key Management, Omnicard, January 15th 17th, 2013, Berlin, Germany. J.Pelzl, Program Chair and Technical Organization, 2nd Think Smart International Conference on Secure Communication for Energy Networks, November 21th 22th, 2012, Düsseldorf, Germany. J.Pelzl, Program Committee, IT Sec, IT Security Industrial & Automation 2012, November 13th 14th, Dresden, Germany. D.Carluccio, J.Pelzl, IT Sicherheit als Treiber moderner Sicherheitstechnologie, Workshop, Innosecure Velbert, May 23th 24th, 2012, Velbert/ Heiligenhaus, Germany. J.Pelzl, Anforderungen und Lösungen für Sicheres Smart Metering, ConLife 2012, June 28th, 2012, Cologne, Germany. J.Pelzl, Organization and Moderation, Introduction to Industrial Cryptography and IT Security Embedded World Conference, February 28th, 2012, Nuremberg, Germany. J.Pelzl, Organization and Moderation, Workshop on Cryptography and Embedded Security, Embedded World Conference 2011, March 1st, 2011, Nuremberg, Germany. J.Pelzl, Program Chair, escar 2010 Embedded Security in Cars, November 2010, Bremen, Germany. J.Pelzl, Program Comitte, CryptArchi, June 27th 30th, 2010, CNRS conference center, Paris, France. J.Pelzl, Program Comitte, S&D4RCES: International Workshop on Security and Dependability for Resource Constrained Embedded Systems (Secure and dependable RCES by design) in conjunction with SAFECOMP 2010 conference, Vienna, Austria, September 14th, 2010, J.Pelzl, Organization and Moderation, Workshop on Cryptography and Embedded Security, Embedded World Conference 2010, March 2nd, 2010, Nuremberg, Germany. J.Pelzl, T.Wollinger, Workshop on Mobile and Embedded IT Security, Wireless Technologies Kongress 2010, September 22th 23th, Bochum, Germany. J.Pelzl, T.Wollinger, Tutorial IT Security in Mobile Applications, Wireless Congress 2010 Systems & Applications, November 10th 11th, Munich, Germany.

6 J.Pelzl, Moderation and Talk, Wie behalte ich die Kontrolle über meine ausgelieferten Produkte? IHK Forum Mittelstand, December 6th, 2010, Bochum, Germany. J.Pelzl, T.Wollinger, Sicheres Aktivieren von Features und Funktionen für Embedded Systeme, DESIGN&ELEKTRONIK Entwicklerforum Embedded System Entwicklung, October 7th 8th, 2009, Ludwigsburg, Germany. J.Pelzl, T.Wollinger, Eingebettete Sicherheit in der Medizintechnik Ein Überblick, DESIGN&ELEKTRONIK Entwicklerforum Embedded goes medical, September 9th, Leipzig, Germany. A.Osterhues, J.Pelzl, T.Wollinger, Workshop on Embedded Security, 6th Wireless Congress: Systems & Applications, October 21st 22nd, 2009, Munich, Germany. D.Bußmeyer, B.Driessen, A.Osterhues, J.Pelzl, V.Reiß, J.Schwenk, C.Wegener, A Generic Architecture and Extension of ecryptfs: Secret Sharing Scheme, Smartcard Integration and a new Linux Security Module, Linux Kongress 2009, Germany. J.Pelzl, T.Wollinger, Sicherheitsaspekte bei Embedded IT, IM die Fachzeitschrift für Information Management & Consulting, April J.Pelzl, T.Wollinger, Automotive Security: Absicherung des Gesamtsystems Kraftfahrzeug durch eingebettete Hard und Software, IM Die Fachzeitschrift für Information Management & Consulting, March J. Pelzl, T. Wollinger, J. Guajardo and C. Paar, Hyperelliptic Curve Cryptosystems, Closing the Performance Gap to Elliptic Curves. Euler Institute of Discrete Mathematics EIDMA Symposium, PhD Conference, Nov , Carlton De Brug, Mierlo Invited Talks J. Pelzl, Automotive Embedded Security Challenges and Chances, SIAT Symposium on International Automotive Technology January 9th 11th, 2013, Pune, India. J. Pelzl, Schutz vor möglichen Eingriffen und Risiken Vertrauenswürdige Software, 12. EUROFORUM Jahrestagung Software im Automobil, May 14th 15th, 2012, Stuttgart. J. Pelzl, Moderation,TeleTrusT Informationstag 'Das Automobil als IT Sicherheitsfall, May 11th, 2012, Berlin. J. Pelzl, Eingebettete Sicherheit in der Medizintechnik, Anforderungen an IT Sicherheit und Datenschutz bei Medizinprodukten. Nürnberger Medizinproduktekonferenz, TüV Rheinland Nuremberg, Germany, March 22nd, J. Pelzl, Moderation und Program Organization, Cryptography and embedded Security The Workshop, Embedded World Conference, February 2nd, 2012, Nuremberg, Germany. J. Pelzl, Security Requirements for Connected Life, ConLife 2011, June 29th 30th, 2011, Cologne, Germany.

7 J. Pelzl, M. Wolf, Mehr Funktionssicherheit durch IT Sicherheit. 3. EUROFORUM Jahrestagung ''ISO 26262'', September 26th 27th, 2011, Stuttgart, Germany. J. Pelzl, Warum die konventionelle IT Sicherheit für PCs im Automobil nicht funktioniert, MAHREG 11. Innovationsforum 'SICHERER: Trends, Entwicklungen und Projekte für mobile und stationäre Systeme', October 1st, Barleben, Germany. J. Pelzl, Sicherheit für die Verwaltung eingebetteter Systeme, EICT Konferenz IT Sicherheit Vertrauen, Datenschutz, Sicherheit und Innovation, February 10th, 2011, Berlin, Germany. J. Pelzl, IT Sicherheit im Automobil: Existierende Lösungen und neue Ansätze, EICT Konferenz IT Sicherheit Sicherheit und Vertrauen in der mobilen Informations und Kommunikationstechnologie, 2009, Berlin, Germany. J. Pelzl, Cryptanalysis with a cost optimized FPGA cluster, Securing Cyberspace: Application and Foundations of Cryptography and Computer Security, Workshop IV: Special purpose hardware for cryptography: Attacks and Applications, December 4 8, 2006, Institute for Pure and Applied Mathematics (IPAM), University of California, Los Angeles (UCLA). J. Pelzl, Exact Cost Estimates of ECC Attacks with Special Purpose Hardware, The 10th Workshop on Elliptic Curve Cryptography ECC 2006, September 18 20, 2006, The Fields Institute, Toronto, Canada. J. Pelzl, Hardware Implementation of ECC, ECC Summer School 2004, September 16th, 2004, Ruhr University Bochum, Germany. J. Pelzl, Arithmetic on Elliptic Curves over GF(2^n), ECC Summer School 2004, September 14th, 2004, Ruhr University Bochum, Germany.

3. Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis. 4. Algorithms for linear algebra problems over principal ideal rings

3. Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis. 4. Algorithms for linear algebra problems over principal ideal rings 1. Faktorisierung großer Zahlen 2. On smooth ideals in number fields 3. Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis 4. Algorithms for linear algebra problems over principal

More information

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in

More information

Publications by Stefan Lucks

Publications by Stefan Lucks Publications by Stefan Lucks Books and Chapters in Books 1. A. Weimerskirch, D. Westhoff, S. Lucks, E. Zenner, Efficient Pairwise Authentication Protocols for Sensor Networks: Theory and Performance Analysis,

More information

Light-Weight Cryptography for Ubiquitous Computing

Light-Weight Cryptography for Ubiquitous Computing Light-Weight Cryptography for Ubiquitous Computing Securing Cyberspace Workshop IV: Special purpose hardware for cryptography Attacks and Applications University of California at Los Angeles, December

More information

Pervasive Computing und. Informationssicherheit

Pervasive Computing und. Informationssicherheit Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing

More information

Light-Weight Cryptography for Ubiquitous Computing

Light-Weight Cryptography for Ubiquitous Computing Light-Weight Cryptography for Ubiquitous Computing Securing Cyberspace Workshop IV: Special purpose hardware for cryptography Attacks and Applications University of California at Los Angeles, December

More information

Testing Framework for estream Profile II Candidates

Testing Framework for estream Profile II Candidates Testing Framework for estream Profile II Candidates L. Batina 1, S. Kumar 2, J. Lano 1, K. Lemke 2, N. Mentens 1, C. Paar 2, B. Preneel 1, K. Sakiyama 1 and I. Verbauwhede 1 1 Katholieke Universiteit Leuven,

More information

Lightweight Cryptography From an Engineers Perspective

Lightweight Cryptography From an Engineers Perspective Lightweight Cryptography From an Engineers Perspective ECC 2007 Acknowledgement Christof Paar A. Bogdanov, L. Knudsen, G. Leander, M. Robshaw, Y. Seurin, C. Vikkelsoe S. Kumar 2 Outline Motivation Hardware

More information

SHARK A Realizable Special Hardware Sieving Device for Factoring 1024-bit Integers

SHARK A Realizable Special Hardware Sieving Device for Factoring 1024-bit Integers SHARK A Realizable Special Hardware Sieving Device for Factoring 1024-bit Integers Jens Franke 1, Thorsten Kleinjung 1, Christof Paar 2, Jan Pelzl 2, Christine Priplata 3, Colin Stahlke 3 1 University

More information

Mobile Network Security Technology Research Center Kyungpook National University

Mobile Network Security Technology Research Center Kyungpook National University The sprit of Truth, Pride, and Service Mobile Network Security Technology Research Center Kyungpook National University June 2006 History June, 2000 August, 2000 Applied for the University Information

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method

An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method Jens Franke 1, Thorsten Kleinjung 1, Christof Paar 2, Jan Pelzl 2, Christine Priplata 3, Martin Šimka4, Colin Stahlke

More information

C U R R I C U L U M V I T A E T R I V A N L E

C U R R I C U L U M V I T A E T R I V A N L E C U R R I C U L U M V I T A E T R I V A N L E Department of Computer Science, 253 Love Building Florida State University, Tallahassee, Florida 32306-4530, USA. Phone: (850) 345-6468, Fax: (850) 644-0058.

More information

Solinas primes of small weight for fixed sizes

Solinas primes of small weight for fixed sizes Solinas primes of small weight for fixed sizes José de Jesús Angel Angel and Guillermo Morales-Luna Computer Science Department, CINVESTAV-IPN, Mexico jjangel@computacion.cs.cinvestav.mx gmorales@cs.cinvestav.mx

More information

Comparative Analysis for Performance acceleration of Modern Asymmetric Crypto Systems

Comparative Analysis for Performance acceleration of Modern Asymmetric Crypto Systems J. of Comp. and I.T. Vol. 3(1&2), 1-6 (2012). Comparative Analysis for Performance acceleration of Modern Asymmetric Crypto Systems RAJ KUMAR 1 and V.K. SARASWAT 2 1,2 Department of Computer Science, ICIS

More information

Cryptography & Network-Security: Implementations in Hardware

Cryptography & Network-Security: Implementations in Hardware Kris Gaj joined ECE GMU in Fall 1998 Cryptography & Network-Security: Implementations in Hardware http://ece.gmu.edu/crypto-text.htm 6 Ph.D. Students Pawel Chodowiec Charikleia Zouridaki Chang Shu Sashisu

More information

UNIVERSITÄTSBIBLIOTHEK

UNIVERSITÄTSBIBLIOTHEK UNIVERSITÄTSBLIOTHEK Zeitschriften im Abonnement Fach: Informatik : Elektronische Zeitschriften finden Sie in der Elektronischen Zeitschriftenbibliothek EZB. Standort : Bereichsbibliothek Informatik Standort

More information

Security and Privacy in Big Data, Blessing or Curse?

Security and Privacy in Big Data, Blessing or Curse? Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology

More information

Multi-Layered Cryptographic Processor for Network Security

Multi-Layered Cryptographic Processor for Network Security International Journal of Scientific and Research Publications, Volume 2, Issue 10, October 2012 1 Multi-Layered Cryptographic Processor for Network Security Pushp Lata *, V. Anitha ** * M.tech Student,

More information

Cryptanalysis with a cost-optimized FPGA cluster

Cryptanalysis with a cost-optimized FPGA cluster Cryptanalysis with a cost-optimized FPGA cluster Jan Pelzl, Horst Görtz Institute for IT-Security, Germany UCLA IPAM Workshop IV Special Purpose Hardware for Cryptography: Attacks and Applications December

More information

Curriculum Vitae. Personal data Date of birth: 1969-09-24 Place of birth: Nordhausen (Thuringia, Germany) Marital status: single

Curriculum Vitae. Personal data Date of birth: 1969-09-24 Place of birth: Nordhausen (Thuringia, Germany) Marital status: single Curriculum Vitae Dr. Torsten Schütze Sturmfederstr. 26 D-74388 Talheim, Germany Phone: +49 71 33 / 1 83 76 50 Mobile Phone: +49 1 73 / 6 51 45 22 E-Mail: torsten.schuetze@rohde-schwarz.com torsten.schuetze@gmx.net

More information

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,

More information

Area time efficient hardware architecture for factoring integers with the elliptic curve method

Area time efficient hardware architecture for factoring integers with the elliptic curve method Area time efficient hardware architecture for factoring integers with the elliptic curve method Jan Pelzl, Martin Šimka, Thorsten Kleinjung, Jens Franke, Christine Priplata, Colin Stahlke, Miloš Drutarovský,

More information

ECC is Ready for RFID A Proof in Silicon

ECC is Ready for RFID A Proof in Silicon ECC is Ready for RFID A Proof in Silicon RFIDsec 08 Presentation Daniel Hein, daniel.hein@gmx.at Johannes Wolkerstorfer, Johannes.Wolkerstorfer@iaik.tugraz.at Norbert Felber, felber@iis.ee.ethz.ch 1 Outline

More information

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch 1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

More information

http://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus

http://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus Christos Kyrkou, PhD KIOS Research Center for Intelligent Systems and Networks, Department of Electrical and Computer Engineering, University of Cyprus, Tel:(+357)99569478, email: ckyrkou@gmail.com Education

More information

Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware

Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware Giacomo de Meulenaer, François Gosset, Guerric Meurice de Dormale, Jean-Jacques Quisquater UCL/DICE

More information

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

Vehicular Security Hardware The Security for Vehicular Security Mechanisms escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security

More information

CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice

CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice THIRD EDITION William Stallings Prentice Hall Pearson Education International CONTENTS CHAPTER 1 OVERVIEW 1 1.1 1.2 1.3 1.4 1.5 1.6 PART ONE CHAPTER

More information

Paolo Maistri. September 8, 2008. Personal Information 2. Education and Studies 2. Academic Activities and Affiliations 3

Paolo Maistri. September 8, 2008. Personal Information 2. Education and Studies 2. Academic Activities and Affiliations 3 CURRICULUM VITAE ET STUDIORUM Paolo Maistri September 8, 2008 TABLE OF CONTENTS Personal Information 2 Education and Studies 2 Academic Activities and Affiliations 3 Teaching Activities 4 Teaching Assistance......................................

More information

Hardware Implementation of AES Encryption and Decryption System Based on FPGA

Hardware Implementation of AES Encryption and Decryption System Based on FPGA Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

Public Key Cryptography. Performance Comparison and Benchmarking

Public Key Cryptography. Performance Comparison and Benchmarking Public Key Cryptography Performance Comparison and Benchmarking Tanja Lange Department of Mathematics Technical University of Denmark tanja@hyperelliptic.org 28.08.2006 Tanja Lange Benchmarking p. 1 What

More information

Introduction to Embedded Systems

Introduction to Embedded Systems Introduction to Embedded Systems Part 1: Introduction 1. What is an embedded system? 2. Product and production automation 3. Preview: technology and programming languages Introduction to Embedded Systems

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies Alaa_hamami@yahoo.com Dr. Mohammad Alaa Al-

More information

Conference Proceedings and Journal Publications

Conference Proceedings and Journal Publications There are no translations available. Conference Proceedings and Journal Publications 2011 - Neumann, R.; Georieva, K.; Dumke, R.; Schmietendorf, A.: Reverse Commerce - Adding Information System Support

More information

1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.

1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics. Curriculum Vitae Vassilis Zikas Postdoctoral Researcher, UCLA University of California, Los Angeles Los Angeles, CA 90095-1596 +1 (424) 781-7942 vzikas@cs.ucla.edu www.cs.ucla.edu/~vzikas Education 2006

More information

Trends in der Forschung für kontaktlose Anwendungen

Trends in der Forschung für kontaktlose Anwendungen Trends in der Forschung für kontaktlose Anwendungen 8. Dresdner RFID Symposium 4. 5. 12. 2014; Dresden, Deutschland Holger Bock, Infineon Technologies Austria AG Überblick Einleitung CATRENE-Projekt NewP@ss

More information

Malicious Off-chip Leakage Enabled by Side-channels

Malicious Off-chip Leakage Enabled by Side-channels MOLES: Malicious Off-chip Leakage Enabled by Side-channels Lang Lin* Wayne Burleson* Christof Paar* # *University of Massachusetts Amherst, USA # Ruhr University Bochum, Germany ICCAD, November 2009 This

More information

Challenge of Ethernet Use in the Automobile

Challenge of Ethernet Use in the Automobile Challenge of Ethernet Use in the Automobile Flexible interfaces and software tools simplify ECU development Already this year, Ethernet will be used as a system network in the first production vehicles.

More information

A New Method for Speeding Up Arithmetic. on Elliptic Curves over Binary Fields

A New Method for Speeding Up Arithmetic. on Elliptic Curves over Binary Fields A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields Kwang Ho Kim and So In Kim Department of Algebra, Institute of Mathematics National Academy of Sciences, Pyongyang, D. P. R.

More information

FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION Abstract In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be

More information

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst. Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.edu Overview Cryptanalysis Challenge Encryption: DES AES Message

More information

Dr. Shashank Srivastava. Contact. E-mail: shashank12@mnnit.ac.in. Telephone: 0532-2271365. Teaching. Courses Taught: Current Courses: Past Courses:

Dr. Shashank Srivastava. Contact. E-mail: shashank12@mnnit.ac.in. Telephone: 0532-2271365. Teaching. Courses Taught: Current Courses: Past Courses: Dr. Shashank Srivastava Assistant Professor Department of Computer Science & Engineering Image Processing Department Building-First Floor Motilal Nehru National Institute of Technology Allahabad-211004,

More information

Information & Communication Security (SS 15)

Information & Communication Security (SS 15) Information & Communication Security (SS 15) Electronic Signatures Dr. Jetzabel Serna-Olvera @sernaolverajm Chair of Mobile Business & Multilateral Security Goethe University Frankfurt www.m-chair.de Agenda

More information

benefits for me Secure and efficient card acceptance and card payments. Postbank P.O.S. Transact

benefits for me Secure and efficient card acceptance and card payments. Postbank P.O.S. Transact benefits for me Secure and efficient card acceptance and card payments. Postbank P.O.S. Transact What we do Cashless payment in the form of card transactions has become an indispensable part of point-of-sale

More information

Implementation and Design of AES S-Box on FPGA

Implementation and Design of AES S-Box on FPGA International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 232-9364, ISSN (Print): 232-9356 Volume 3 Issue ǁ Jan. 25 ǁ PP.9-4 Implementation and Design of AES S-Box on FPGA Chandrasekhar

More information

Factors and primes in two Smarandache sequences

Factors and primes in two Smarandache sequences Factors and primes in two Smarandache sequences Ralf W. Stephan 1998 Abstract Using a personal computer and freely available software, the author factored some members of the Smarandache consecutive sequence

More information

Applied and Integrated Security. C. Eckert

Applied and Integrated Security. C. Eckert Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass

More information

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering

More information

for High Performance Computing

for High Performance Computing Technische Universität München Institut für Informatik Lehrstuhl für Rechnertechnik und Rechnerorganisation Automatic Performance Engineering Workflows for High Performance Computing Ventsislav Petkov

More information

Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security

Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität

More information

Evaluating The Performance of Symmetric Encryption Algorithms

Evaluating The Performance of Symmetric Encryption Algorithms International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,

More information

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn

More information

New Directions in Lightweight Cryptographic Primitives for RFID Applications

New Directions in Lightweight Cryptographic Primitives for RFID Applications New Directions in Lightweight Cryptographic Primitives for RFID Applications RFID CUSP Workshop January 23-24, 2008 John Hopkins University Christof Paar University of Bochum and escrypt Inc. Embedded

More information

Software Construction

Software Construction Software Construction Staff Faculty: Univ.-Prof. Dr. rer. nat. Horst Lichter lichter@informatik.rwth-aachen.de Secretary: Bärbel Kronewetter Phone: +49 241 80 21 330 Fax: +49 241 80 22 352 Research Assistants:

More information

Cyber-Physical Systems, Internet of Things & Industry 4.0 First Technical Prototypes

Cyber-Physical Systems, Internet of Things & Industry 4.0 First Technical Prototypes Cyber-Physical Systems, Internet of Things & Industry 4.0 First Technical Prototypes Johannes Schöning Munich, Germany 10/2013 London Münster Berlin Köln Hasselt Saarbrücken Innovative Retail Lab (IRL)

More information

NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS

NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS André Groll, Jan Holle University of Siegen, Institute for Data Communications Systems {andre.groll,jan.holle}@uni-siegen.de

More information

Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker

Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker Sandeep Kumar 1, Christof Paar 1, Jan Pelzl 1, Gerd Pfeiffer 2, and Manfred Schimmler 2 1 Horst Görtz Institute for IT Security,

More information

An Instruction Set Extension for Fast and Memory-Efficient AES Implementation

An Instruction Set Extension for Fast and Memory-Efficient AES Implementation An Instruction Set Extension for Fast and Memory-Efficient AES Implementation Stefan Tillich, Johann Großschädl, and Alexander Szekely Graz University of Technology Institute for Applied Information Processing

More information

Walter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this field.

Walter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this field. 27, IT Security Techniques An Interview with Walter Fumy, Chairman of ISO/IEC JTC 1/SC Walter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this

More information

MEMBERSHIPS Amt24 APAN ARTEMIS AUTOSAR Berliner Wirtschaftsgespräche e. V. BITKOM Working Groups and Committees Federal Government of Germany

MEMBERSHIPS Amt24 APAN ARTEMIS AUTOSAR Berliner Wirtschaftsgespräche e. V. BITKOM Working Groups and Committees Federal Government of Germany MEMBERSHIPS Amt24 - Effiziente Lösungen für die moderne Verwaltung APAN - Asia Pacific Advanced Network ARTEMIS Industry Association - Autonomic Communication Forum AUTOSAR - Car2Car Communication Consortium

More information

A blind digital signature scheme using elliptic curve digital signature algorithm

A blind digital signature scheme using elliptic curve digital signature algorithm A blind digital signature scheme using elliptic curve digital signature algorithm İsmail BÜTÜN * and Mehmet DEMİRER *Department of Electrical Engineering, University of South Florida, Tampa, FL, USA Department

More information

SPICE auf der Überholspur. Vergleich von ISO (TR) 15504 und Automotive SPICE

SPICE auf der Überholspur. Vergleich von ISO (TR) 15504 und Automotive SPICE SPICE auf der Überholspur Vergleich von ISO (TR) 15504 und Automotive SPICE Historie Software Process Improvement and Capability determination 1994 1995 ISO 15504 Draft SPICE wird als Projekt der ISO zur

More information

Embedded Software Development and Test in 2011 using a mini- HIL approach

Embedded Software Development and Test in 2011 using a mini- HIL approach Primoz Alic, isystem, Slovenia Erol Simsek, isystem, Munich Embedded Software Development and Test in 2011 using a mini- HIL approach Kurzfassung Dieser Artikel beschreibt den grundsätzlichen Aufbau des

More information

Mutual Authentication Based on HECC for RFID Implant Systems

Mutual Authentication Based on HECC for RFID Implant Systems Mutual Authentication Based on HECC for RFID Implant Systems Asha Liza John (&) and Sabu M. Thampi Indian Institute of Information Technology and Management - Kerala (IIITM-K), Technopark Campus, Trivandrum,

More information

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique

More information

CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography

CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography 28. Februar 2008 Alexander Klimm, Oliver Sander, Jürgen Becker Institut für Technik der Informationsverarbeitung Sylvain

More information

Vertrauen in Cloud Dienste schaffen

Vertrauen in Cloud Dienste schaffen Vertrauen in Cloud Dienste schaffen Symantec Übersicht Thomas Hemker, CISSP Security Strategist Thomas Hemker 18 Jahre IT Security Security CTO Team CISO Kontakt Beratung CISSP Security Strategist Thomas_hemker@symantec.com

More information

A Factoring and Discrete Logarithm based Cryptosystem

A Factoring and Discrete Logarithm based Cryptosystem Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques

More information

Jannes Rauch Current Position Education Relevant Positions

Jannes Rauch Current Position Education Relevant Positions Jannes Rauch Master of Science (Finance) University of Cologne Faculty of Management, Economics and Social Sciences Department of Risk Management and Insurance Kerpener Strasse 30 50937 Cologne, Germany

More information

Michael Schulte-Mecklenbeck

Michael Schulte-Mecklenbeck Michael Schulte-Mecklenbeck, Ph.D. Columbia Business School 3022 Broadway Uris Hall 5M New York, NY 10027 USA michael@schulte-mecklenbeck.com www.schulte-mecklenbeck.com Curriculum Vitae Michael Schulte-Mecklenbeck

More information

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager About our Cryptographic and Security Testing Laboratory Bringing together a suite of conformance testing

More information

Cyber Security Practical considerations for implementing IEC 62351

Cyber Security Practical considerations for implementing IEC 62351 1. Introduction Cyber Security Practical considerations for implementing IEC 62351 Frank Hohlbaum, Markus Braendle, Fernando Alvarez ABB frank.hohlbaum@ch.abb.com Switzerland Two trends are currently changing

More information

Requirements Engineering on the Transition to Product and Innovation Management

Requirements Engineering on the Transition to Product and Innovation Management Requirements Engineering on the Transition to Product and Innovation Management The Innovation Perspective Dipl.-Ing. Dr. techn. Mario Pichler ++43 7236 3343 898 mario.pichler@scch.at www.scch.at Technologies

More information

Lean Innovation. A Fast Path from Knowledge to Value. Bearbeitet von Claus Sehested, Henrik Sonnenberg

Lean Innovation. A Fast Path from Knowledge to Value. Bearbeitet von Claus Sehested, Henrik Sonnenberg Lean Innovation A Fast Path from Knowledge to Value Bearbeitet von Claus Sehested, Henrik Sonnenberg 1st Edition. 2010. Buch. x, 192 S. Hardcover ISBN 978 3 642 15894 0 Format (B x L): 15,5 x 23,5 cm Gewicht:

More information

Research Article. ISSN 2347-9523 (Print) *Corresponding author Shi-hai Zhu Email:

Research Article. ISSN 2347-9523 (Print) *Corresponding author Shi-hai Zhu Email: Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(3A):352-357 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)

More information

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM NABI ET AL: IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM 28 IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM Mohammad Noor

More information

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Overview on Activities Related to Academic Utilization Contributors: Cassidian

More information

Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing

Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing 322 The International Arab Journal of Information Technology, Vol. 11, No. 4, July 2014 Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

More information

Security concept for gateway integrity protection within German smart grids

Security concept for gateway integrity protection within German smart grids ASE 2014, ECSaR-Workshop Security concept for gateway integrity protection within German smart grids Prof. Dr. Kai-Oliver Detken 1, Carl-Heinz Genzel 2, Olav Hoffmann 3, Prof. Dr. Richard Sethmann 4 1

More information

Model-based Analysis of Infrastructure Projects and Market Integration in the Region of South-South Eastern Europe

Model-based Analysis of Infrastructure Projects and Market Integration in the Region of South-South Eastern Europe Institute of Energy Economics at the University of Cologne Model-based Analysis of Infrastructure Projects and Market Integration in the Region of South-South Eastern Europe Stefan Lochner Project Proposal

More information

ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDS

ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDS ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDS D. Sravana Kumar 1 CH. Suneetha 2 A. ChandrasekhAR 3 1 Reader in Physics, SVLNS Government College, Bheemunipatnam, Visakhapatnam Dt., India skdharanikota@gmail.com

More information

µfup: A Software Development Process for Embedded Systems

µfup: A Software Development Process for Embedded Systems µfup: A Software Development Process for Embedded Systems Leif Geiger, Jörg Siedhof, Albert Zündorf University of Kassel, Software Engineering Research Group, Department of Computer Science and Electrical

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

FPGA area allocation for parallel C applications

FPGA area allocation for parallel C applications 1 FPGA area allocation for parallel C applications Vlad-Mihai Sima, Elena Moscu Panainte, Koen Bertels Computer Engineering Faculty of Electrical Engineering, Mathematics and Computer Science Delft University

More information

Dr. Anna Maria Schneider

Dr. Anna Maria Schneider Dr. Anna Maria Schneider Postdoctoral Researcher Faculty of Economics and Business Administration Humboldt Universität zu Berlin Rosenstraße 19 10178 Berlin, Germany anna maria.schneider[at]wiwi.hu berlin.de

More information

EMBEDDING DEGREE OF HYPERELLIPTIC CURVES WITH COMPLEX MULTIPLICATION

EMBEDDING DEGREE OF HYPERELLIPTIC CURVES WITH COMPLEX MULTIPLICATION EMBEDDING DEGREE OF HYPERELLIPTIC CURVES WITH COMPLEX MULTIPLICATION CHRISTIAN ROBENHAGEN RAVNSHØJ Abstract. Consider the Jacobian of a genus two curve defined over a finite field and with complex multiplication.

More information

University of Münster, Institute of Political Science, Scharnhorststraße 100, 48151 Münster, Germany. Email: thomas.dietz@uni-muenster.

University of Münster, Institute of Political Science, Scharnhorststraße 100, 48151 Münster, Germany. Email: thomas.dietz@uni-muenster. Professor Dr. Thomas Dietz University of Münster, Institute of Political Science, Scharnhorststraße 100, 48151 Münster, Germany Email: thomas.dietz@uni-muenster.de CURRENT POSITION University of Münster,

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

exceet Secure Solutions Smart & Secure Network From Vision to Reality

exceet Secure Solutions Smart & Secure Network From Vision to Reality exceet Secure Solutions Smart & Secure Network From Vision to Reality Agenda 1. About exceet 2. Entering the World of Smart Connected Products 3. exceet s Transformation Developing New Competencies 4.

More information

Kapitel 2 Unternehmensarchitektur III

Kapitel 2 Unternehmensarchitektur III Kapitel 2 Unternehmensarchitektur III Software Architecture, Quality, and Testing FS 2015 Prof. Dr. Jana Köhler jana.koehler@hslu.ch IT Strategie Entwicklung "Foundation for Execution" "Because experts

More information

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University

More information

Session Initiation Protocol Attacks and Challenges

Session Initiation Protocol Attacks and Challenges 2012 IACSIT Hong Kong Conferences IPCSIT vol. 29 (2012) (2012) IACSIT Press, Singapore Session Initiation Protocol Attacks and Challenges Hassan Keshavarz +, Mohammad Reza Jabbarpour Sattari and Rafidah

More information

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

Design and Implementation of Asymmetric Cryptography Using AES Algorithm Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,

More information