Michael Hutter

Publications

You can find also my list of publications at Google Scholar, DBLP, or ResearchGate.

Conference Proceedings
2019 Elke De Mulder, Samatha Gummalla, Michael Hutter - "Protecting RISC-V against Side-Channel Attacks" - Proceedings of the 56th Annual Design Automation Conference 2019 - DAC, Las Vegas, NV, USA, June 02-06, Volume 2019, Proceedings. Icon BibTex Icon Download Inactive Icon WebUrl
2018 Pascal Sasdrich, Michael Hutter - "Protecting Triple-DES Against DPA - A Practical Application of Domain-Oriented Masking" - Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings. Icon BibTex Icon Download Inactive Icon WebUrl
2017 Melissa Rossi, Mike Hamburg, Michael Hutter, and Mark E. Marson - "A Side-Channel Assisted Cryptanalytic Attack Against QcBits" - Cryptographic Hardware and Embedded Systems - CHES 2017, 18th International Workshop, Taipei, Taiwan, September 25-28, 2017, Proceedings. Icon BibTex Icon Download Inactive Icon WebUrl
2016 Michael Hutter - "Threshold Implementations in Industry: A Case Study on SHA-256" - Proceedings of the ACM Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016. Icon BibTex Icon Download Inactive Icon WebUrl
2015 Michael Mühlberghuber, Thomas Korak, Philipp Dunst, Michael Hutter - "Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC" - Constructive Side-Channel Analysis and Secure Design - COSADE 2015, 6th International Workshop, Berlin, Germany, April 13-14, Proceedings. Icon BibTex Icon Download Inactive Icon WebUrl
2015 Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser - "NaCl's Crypto_box in Hardware" - Cryptographic Hardware and Embedded Systems - CHES 2015, 16th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings. Icon BibTex Icon Download Inactive Icon WebUrl
2014 Thomas Korak, Michael Hutter - "On the Power of Active Relay Attacks using Custom-Made Proxies" - IEEE International Conference on RFID - IEEE RFID 2014, Orlando, Florida, USA, April 8-10. Proceedings. Icon BibTex Icon Download Icon WebUrl
2014 Gesine Hinterwälder, Amir Moradi, Michael Hutter, Peter Schwabe, Christof Paar - "Full-Size High-Security ECC Implementation on MSP430 Microcontrollers" - Latincrypt 2014 - 3rd International Workshop, Florianopolis, Brazil, September 17-19, Proceedings. Icon BibTex Icon Download Inactive Icon WebUrl
2014 Peter Pessl, Michael Hutter - "Curved Tags - A Low-Resource ECDSA Implementation tailored for RFID" - Workshop on RFID Security - RFIDsec 2014, 10th Workshop, Oxford, UK, July 21 -23, 2014, Proceedings. Icon BibTex Icon Download Inactive Icon WebUrl
2014 Oliver Söll, Thomas Korak, Michael Mühlberghuber, Michael Hutter - "EM-Based Detection of Hardware Trojans on FPGAs" - IEEE International Symposium on Hardware-Oriented Security and Trust -- HOST 2014, Arlington, Virginia, USA, May 6-7 Icon BibTex Icon Download Icon WebUrl
2014 Hannes Groß, Erich Wenger, Honorio Martín, Michael Hutter - "PIONEER - a Prototype for the Internet of Things based on an Extendable EPC Gen2 RFID Tag" - Workshop on RFID Security - RFIDsec 2014, 10th Workshop, Oxford, UK, July 21 -23, 2014, Proceedings. Icon BibTex Icon Download Inactive Icon WebUrl
2014 Wolfgang Wieser, Michael Hutter - "Efficient Multiplication on Low-Resource Devices" - Euromicro Conference on Digital System Design Architectures, Methods and Tools -- DSD 2014, Verona, Italy, August, 27-29, 2014, Proceedings Icon BibTex Icon Download Inactive Icon WebUrl
2014 Thomas Korak, Michael Hutter, Baris Ege, Lejla Batina - "Clock Glitch Attacks in the Presence of Heating" - Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2014, Busan, Korea, September 23, 2014, Proceedings Icon BibTex Icon Download Inactive Icon WebUrl
2013 Elke De Mulder, Michael Hutter, Mark Marson, Peter Pearson - "Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA" - Cryptographic Hardware and Embedded Systems - CHES 2013, 14th International Workshop, Santa Barbara, California, USA, August 20-23, 2013, Proceedings. Icon BibTex Icon Download Icon WebUrl
2013 Peter Pessl, Michael Hutter - "Pushing The Limits of SHA-3 Hardware Implementations to Fit on RFID" - Cryptographic Hardware and Embedded Systems - CHES 2013, 14th International Workshop, Santa Barbara, California, USA, August 20-23, 2013, Proceedings. Icon BibTex Icon Download Icon WebUrl
2013 Michael Hutter, Peter Schwabe - "NaCl on 8-bit AVR Microcontrollers" - Progress in Cryptology – AFRICACRYPT 2013 Sixth International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings. Icon BibTex Icon Download Icon WebUrl
2013 Roman Silberschneider, Thomas Korak, Michael Hutter - "Access Without Permission: A Practical RFID Relay Attack " - Austrochip 2013, 21st Austrian Workshop on Microelectronics, Linz, Austria, October 10, 2013, Proceedings Icon BibTex Icon Download Icon WebUrl
2013 Michael Muehlberghuber, Frank K. Gurkaynak, Thomas Korak, Philipp Dunst, Michael Hutter - "Red Team vs. Blue Team Hardware Trojan Analysis: Detection of a Hardware Trojan on an Actual ASIC" - Hardware and Architectural Support for Security and Privacy - HASP 2013, Second Workshop, Tel-Aviv, Israel, June 23, 2013, Proceedings. Icon BibTex Icon Download Icon WebUrl
2013 Michael Hutter, Jörn-Marc Schmidt - "The Temperature Side-Channel and Heating Fault Attacks" - Smart Card Research and Advanced Applications - CARDIS 2013, 12th International Conference, Berlin, Germany, November 27-29, 2013, Proceedings. Icon BibTex Icon Download Icon WebUrl
2012 Thomas Korak, Thomas Plos, Michael Hutter - "Attacking an AES-enabled NFC Tag - Implications from Design to a Real-World Scenario" - 3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, 3. - 4. May, 2012, Proceedings. Icon BibTex Icon Download Icon WebUrl
2012 Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Stefan Mangard - "Exploiting the Difference of Side-Channel Leakages" - Constructive Side-Channel Analysis and Secure Design - COSADE 2012, 3rd International Workshop, Darmstadt, Germany, May 3-4, 2012, Proceedings. Icon BibTex Icon Download Icon WebUrl
2012 Nashwa A. F. Mohammed, Mohsin H. A. Hashim, Michael Hutter - "Improved Fixed-base Comb Method for Fast Scalar Multiplication" - Progress in Cryptology – AFRICACRYPT 2012 Fifth International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings Icon BibTex Icon Download Icon WebUrl
2012 Markus Pelnar, Michael Mühlberghuber, Michael Hutter - "Putting Together What Fits Together - GrAEStl" - Smart Card Research and Advanced Applications - CARDIS 2012, 11th International Conference, Graz, Austria, November 28–30, 2012, Proceedings. Icon BibTex Icon Download Icon WebUrl
2011 Michael Hutter, Erich Wenger - "Fast Multi-Precision Multiplication for Public-Key Cryptography on Embedded Microprocessors" - Cryptographic Hardware and Embedded Systems - CHES 2011, 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings. Icon BibTex Icon Download Icon WebUrl
2011 Wolfgang Issovits, Michael Hutter - "Weaknesses of the ISO/IEC 14443 Protocol Regarding Relay Attacks" - Conference on RFID-Technologies and Applications - RFID-TA 2011, IEEE International Conference, Barcelona, Spain, September 15-16, 2011, Proceedings. Icon BibTex Icon Download Icon WebUrl
2011 Erich Wenger, Michael Hutter - "A Hardware Processor Supporting Elliptic Curve Cryptography for Less Than 9 kGEs" - Smart Card Research and Advanced Applications Icon BibTex Icon Download Icon WebUrl
2011 Erich Wenger, Michael Hutter - "Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations" - Information Security Technology for Applications - 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers Icon BibTex Icon Download Icon WebUrl
2011 Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer - "A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES like Sardines" - Information Security Theory and Practices - WISTP 2011, 5th International Workshop, Heraklion, Greece, June 1-3, 2011, Proceedings. Icon BibTex Icon Download Icon WebUrl
2011 Michael Hutter, Marc Joye, Yannick Sierra - "Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation" - Progress in Cryptology – AFRICACRYPT 2011 Fourth International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings Icon BibTex Icon Download Icon WebUrl
2011 Christian Pendl, Markus Pelnar, Michael Hutter - "Elliptic Curve Cryptography on the WISP UHF RFID Tag" - Workshop on RFID Security - RFIDsec 2011, 7th Workshop, Amherst, Massachusetts, USA, June 26-28, 2011, Proceedings Icon BibTex Icon Download Icon WebUrl
2010 Jörn-Marc Schmidt, Thomas Plos, Mario Kirschbaum, Michael Hutter, Marcel Medwed, Christoph Herbst - "Side-Channel Leakage Across Borders" - Smart Card Research and Advanced Applications 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010 Icon BibTex Icon Download Icon WebUrl
2010 Michael Hutter, Ronald Tögl - "A Trusted Platform Module for Near Field Communication" - Conference on Systems and Networks Communications - ICSNC 2010, 5th International Conference, Nice, France, August 22-27, 2010, Proceedings. Icon BibTex Icon Download Icon WebUrl
2010 Martin Feldhofer, Manfred Josef Aigner, Michael Hutter, Thomas Plos, Erich Wenger, Thomas Baier - "Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags" - Workshop on RFID / USN Security and Cryptography Icon BibTex Icon Download Icon WebUrl
2010 Michael Hutter, Martin Feldhofer, Thomas Plos - "An ECDSA Processor for RFID Authentication" - Workshop on RFID Security - RFIDsec 2010, 6th Workshop, Istanbul, Turkey, June 7-9, 2010, Proceedings Icon BibTex Icon Download Icon WebUrl
2009 Christoph Nagl, Michael Hutter - "Coupon Recalculation for the Schnorr and GPS Identification Scheme: A Performance Evaluation" - Workshop on RFID Security 2009 - RFIDSec 2009, 5th edition, Leuven, Belgium, June 30-July 2, 2009 Icon BibTex Icon Download Icon WebUrl
2009 Michael Hutter - "RFID Authentication Protocols based on Elliptic Curves: A Top-Down Evaluation Survey" - International Conference on Security and Cryptography - SECRYPT 2009, it is part of ICETE - The International Joint Conference on e-Business and Telecommunications, Milan, Italy, July 7-10, 2009, Proceedings Icon BibTex Icon Download Icon WebUrl
2009 Michael Hutter, Alexander Szekely, Johannes Wolkerstorfer - "Embedded System Management using WBEM" - Integrated Network Management - IM 2009, 11th IFIP/IEEE International Symposium, New York, USA, June 1-5, 2009, Proceedings Icon BibTex Icon Download Icon WebUrl
2009 Michael Hutter, Thomas Plos, Jörn-Marc Schmidt - "Contact-Based Fault Injections and Power Analysis on RFID Tags" - European Conference on Circuit Theory and Design - ECCTD 2009, 19th IEEE European Conference, Antalya, Turkey, August 23-27, 2009, Proceedings Icon BibTex Icon Download Icon WebUrl
2009 Michael Hutter, Marcel Medwed, Daniel Hein, Johannes Wolkerstorfer - "Attacking ECDSA-Enabled RFID Devices" - Applied Cryptography and Network Security - ACNS 2009, 7th International Conference, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings Icon BibTex Icon Download Icon WebUrl
2009 Thomas Plos, Michael Hutter, Martin Feldhofer - "On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices" - Workshop on Information Security Applications - WISA 2009, Busan, Korea, August 25-27, 2009, Proceedings Icon BibTex Icon Download Icon WebUrl
2009 Jörn-Marc Schmidt, Michael Hutter, Thomas Plos - "Optical Fault Attacks on AES: A Threat in Violet" - 6th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2009 Icon BibTex Icon Download Icon WebUrl
2008 Thomas Lorünser, Edwin Querasser, Thomas Matyus, Momtchil Peev, Johannes Wolkerstorfer, Michael Hutter, Alexander Szekely, Ilse Wimberger, Christian Pfaffel-Janser, Andreas Neppach - "Security Processor with Quantum Key Distribution" - Proceedings of the 19th International Conference on Application-Specific Systems, Architectures and Processors Icon BibTex Icon Download Icon WebUrl
2008 Michael Hutter, Jörn-Marc Schmidt, Thomas Plos - "RFID and Its Vulnerability to Faults" - Cryptographic Hardware and Embedded Systems – CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008, Proceedings Icon BibTex Icon Download Icon WebUrl
2008 Thomas Plos, Michael Hutter, Christoph Herbst - "Enhancing Side-Channel Analysis with Low-Cost Shielding Techniques" - Proceedings of Austrochip 2008, Linz, Austria, October 8, 2008, Proceedings Icon BibTex Icon Download Icon WebUrl
2008 Thomas Plos, Michael Hutter, Martin Feldhofer - "Evaluation of Side-Channel Preprocessing Techniques on Cryptographic-Enabled HF and UHF RFID-Tag Prototypes" - Workshop on RFID Security 2008, Budapest, Hungary, July 9-11, 2008 Icon BibTex Icon Download Icon WebUrl
2007 Jörn-Marc Schmidt, Michael Hutter - "Optical and EM Fault-Attacks on CRT-based RSA: Concrete Results" - Austrochip 2007, 15th Austrian Workhop on Microelectronics, 11 October 2007, Graz, Austria, Proceedings Icon BibTex Icon Download Icon WebUrl
2007 Michael Hutter, Stefan Mangard, Martin Feldhofer - "Power and EM Attacks on Passive 13.56 MHz RFID Devices" - Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings Icon BibTex Icon Download Icon WebUrl

Part of a book
2012 Michael Hutter, Erich Wenger, Markus Pelnar, Christian Pendl - "Elliptic Curve Cryptography on WISPs book title: Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID" Icon BibTex Icon Download Inactive Icon WebUrl

Journal Articles
2020 Michael Hutter, Erich Wenger - "Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors" - Journal of Cryptology Icon BibTex Icon Download Inactive Icon WebUrl
2020 Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark E. Marson - "Low-Latency Hardware Masking with Application to AES" - IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2020, Proceedings. Icon BibTex Icon Download Inactive Icon WebUrl
2019 Michael Hutter, Michael Tunstall - "Constant-time higher-order Boolean-to-arithmetic masking" - Journal of Cryptographic Engineering Icon BibTex Icon Download Inactive Icon WebUrl
2018 Michael Hutter, Erich Wenger - "Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors" - Journal of Cryptology Icon BibTex Icon Download Inactive Icon WebUrl
2015 Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sanchez, Peter Schwabe: - "High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers" - Designs, Codes and Cryptography Icon BibTex Icon Download Inactive Icon WebUrl
2015 Michael Hutter, Peter Schwabe: - "Multiprecision multiplication on AVR revisited" - Journal of Cryptographic Engineering (Volume 5) Icon BibTex Icon Download Inactive Icon WebUrl
2015 Honorio Martin, Thomas Korak, Enrique San Millan, Michael Hutter - "Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness" - IEEE Transactions on Information Forensics and Security (Volume: 10) Icon BibTex Icon Download Inactive Icon WebUrl
2014 Elke De Mulder, Michael Hutter, Mark Marson, Peter Pearson - "Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA: Extended Version" - Journal of Cryptographic Engineering (Volume: 4) Icon BibTex Icon Download Icon WebUrl
2013 Thomas Plos, Michael Hutter, Martin Feldhofer, Maksimiljan Stiglic, Francesco Cavaliere - "Security-enabled NFC Tag with Flexible Architecture Supporting Asymmetric Cryptography" - IEEE Transactions on Very Large Scale Integration (VLSI) Systems (Volume: 21) Icon BibTex Icon Download Icon WebUrl
2012 Thomas Plos, Manfred Aigner, Thomas Baier, Martin Feldhofer, Michael Hutter, Thomas Korak, Erich Wenger - "Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags" - International Journal of RFID Security and Cryptography (Volume: 1) Icon BibTex Icon Download Icon WebUrl
2011 Michael Hutter, Ronald Tögl - "Touch'n Trust: An NFC-Enabled Trusted Platform Module" - International Journal on Advances in Security (Volume: 4) Icon BibTex Icon Download Inactive Icon WebUrl
2011 Ronald Tögl, Michael Hutter - "An Approach to Introducing Locality in Remote Attestation using Near Field Communications" - The Journal of Supercomputing (Volume: 55) Icon BibTex Icon Download Inactive Icon WebUrl
2010 Michael Hutter, Thomas Plos, Martin Feldhofer - "On the Security of RFID Devices against Implementation Attacks" - International Journal of Security and Networks (Volume: 5 2/3) Icon BibTex Icon Download Icon WebUrl

Technical Reports and Preprints
2014 Michael Hutter and Peter Schwabe - "Multiprecision multiplication on AVR revisited" - Cryptology ePrint Archive, https://eprint.iacr.org/2014/592.pdf. Icon BibTex Icon Download Icon WebUrl
2011 Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt - "Test Apparatus for Side-Channel Resistance Compliance Testing" - Non-Invasive Attack Testing Workshop - NIAT 2011, International Workshop, Nara, Japan, September 26-27, 2011. Icon BibTex Icon Download Icon WebUrl
2011 Ivan Gudymenko, Michael Hutter - "Security in the Internet of Things" - Intensive Program on Information Communication Security, IPICS Summer School, Korfu, Greece, 22-31 August Icon BibTex Icon Download Icon WebUrl

Dissertation Thesis
2011 Michael Hutter - "Secure and Efficient Implementation of RFID Tags Supporting Cryptography" Icon BibTex Icon Download Inactive Icon WebUrl

Master Thesis
2007 Michael Hutter - "EM Side-Channel Attacks on Cryptographic Devices" Icon BibTex Icon Download Inactive Icon WebUrl