C
Christof Paar
Researcher at Max Planck Society
Publications - 409
Citations - 23389
Christof Paar is an academic researcher from Max Planck Society. The author has contributed to research in topics: Cryptography & Encryption. The author has an hindex of 69, co-authored 399 publications receiving 21790 citations. Previous affiliations of Christof Paar include University of Massachusetts Amherst & University of Duisburg-Essen.
Papers
More filters
Book ChapterDOI
Modular Integer Arithmetic for Public Key Cryptography
Tim Güneysu,Christof Paar +1 more
TL;DR: This chapter discusses building blocks for implementing popular public key cryptosystems, like RSA, Diffie-Hellman Key Exchange (DHKE) and Elliptic Curve Cryptography (ECC), and briefly introduces field-based arithmetic on which most of recently established public key Cryptography rely.
Book ChapterDOI
Solving binary linear equation systems over the rationals and binaries
Benedikt Driessen,Christof Paar +1 more
TL;DR: A generic method to map a rational solution to a solution which solves the equation system over $\mathbb{F}_2$ and it is shown that, in order to perform this mapping, one only needs to look at two bits of the binary expansion of each of the elements of the rational solution vector.
Journal Article
Reconfigurable instruction set extension for enabling ECC on an 8-bit processor
Sandeep Kumar,Christof Paar +1 more
TL;DR: This contribution describes a proof-of-concept implementation for an extremely low-cost instruction set extension using reconfigurable logic, which enables an 8-bit micro-controller to provide full size elliptic curve cryptography (ECC) capabilities.
Proceedings Article
One-touch financial transaction authentication
TL;DR: A Wi-Fi user-authentication token that tunnels data through the SSID field, packet timing, and packet length to create a token that can authenticate transactions using only one touch by the user.
Book ChapterDOI
Physical security bounds against tampering
TL;DR: In this paper, an adversarial model with a strong focus on fault injection techniques based on radiation and particle impact is presented, and physical implementation strategies to counteract tampering attempts are discussed.