Abstract is missing.
- CryptoExamples: Secure, minimal, complete, copyable and tested code examples for Crypto APIsKai Mindermann, Stefan Wagner 0001. [doi]
- Error-Correcting Codes for Lattice-Based Key ExchangeTim Fritzmann. [doi]
- DATA - Differential Address Trace AnalysisSamuel Weiser, Andreas Zankl, Raphael Spreitzer, Katja Miller, Stefan Mangard, Georg Sigl. [doi]
- Post-Quantum Software UpdatesStefan-Lukas Gazdag. [doi]
- Advanced Reconfigurable Physical Unclonable Functions (AR-PUFs) and Their Security ApplicationsManish Kumar, Nikolaos Athanasios Anagnostopoulos, Yufan Fan, Stefan Katzenbeisser 0001. [doi]
- Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable FunctionsNikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Christian Hatzfeld, Fatemeh Tehranipoor, Stefan Katzenbeisser 0001. [doi]
- Chains and Whips - An approach to lighweight MACsPaul Walther, Stefan Köpsell, Frederik Armknecht, Gene Tsudik, Thorsten Strufe. [doi]
- Wiretap Coding in the Context of PUFsChristoph Frisch. [doi]
- Post-quantum security: Power Analysis of NTRUEncryptThomas Schamberger. [doi]