scispace - formally typeset
C

Christof Paar

Researcher at Max Planck Society

Publications -  409
Citations -  23389

Christof Paar is an academic researcher from Max Planck Society. The author has contributed to research in topics: Cryptography & Encryption. The author has an hindex of 69, co-authored 399 publications receiving 21790 citations. Previous affiliations of Christof Paar include University of Massachusetts Amherst & University of Duisburg-Essen.

Papers
More filters
Book ChapterDOI

Modular Integer Arithmetic for Public Key Cryptography

TL;DR: This chapter discusses building blocks for implementing popular public key cryptosystems, like RSA, Diffie-Hellman Key Exchange (DHKE) and Elliptic Curve Cryptography (ECC), and briefly introduces field-based arithmetic on which most of recently established public key Cryptography rely.
Book ChapterDOI

Solving binary linear equation systems over the rationals and binaries

TL;DR: A generic method to map a rational solution to a solution which solves the equation system over $\mathbb{F}_2$ and it is shown that, in order to perform this mapping, one only needs to look at two bits of the binary expansion of each of the elements of the rational solution vector.
Journal Article

Reconfigurable instruction set extension for enabling ECC on an 8-bit processor

TL;DR: This contribution describes a proof-of-concept implementation for an extremely low-cost instruction set extension using reconfigurable logic, which enables an 8-bit micro-controller to provide full size elliptic curve cryptography (ECC) capabilities.
Proceedings Article

One-touch financial transaction authentication

TL;DR: A Wi-Fi user-authentication token that tunnels data through the SSID field, packet timing, and packet length to create a token that can authenticate transactions using only one touch by the user.
Book ChapterDOI

Physical security bounds against tampering

TL;DR: In this paper, an adversarial model with a strong focus on fault injection techniques based on radiation and particle impact is presented, and physical implementation strategies to counteract tampering attempts are discussed.