|
|
|
Publications
You can find also my list of publications at Google Scholar, DBLP, or ResearchGate.
Conference Proceedings |
2019 |
Elke De Mulder, Samatha Gummalla, Michael Hutter - "Protecting RISC-V against Side-Channel Attacks" - Proceedings of the 56th Annual Design Automation Conference 2019 - DAC, Las Vegas, NV, USA, June 02-06, Volume 2019, Proceedings. |
|
|
|
2018 |
Pascal Sasdrich, Michael Hutter - "Protecting Triple-DES Against DPA - A Practical Application of Domain-Oriented Masking" - Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings. |
|
|
|
2017 |
Melissa Rossi, Mike Hamburg, Michael Hutter, and Mark E. Marson - "A Side-Channel Assisted Cryptanalytic Attack Against QcBits" - Cryptographic Hardware and Embedded Systems - CHES 2017, 18th International Workshop, Taipei, Taiwan, September 25-28, 2017, Proceedings. |
|
|
|
2016 |
Michael Hutter - "Threshold Implementations in Industry: A Case Study on SHA-256" - Proceedings of the ACM Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016. |
|
|
|
2015 |
Michael Mühlberghuber, Thomas Korak, Philipp Dunst, Michael Hutter - "Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC" - Constructive Side-Channel Analysis and Secure Design - COSADE 2015, 6th International Workshop, Berlin, Germany, April 13-14, Proceedings. |
|
|
|
2015 |
Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser - "NaCl's Crypto_box in Hardware" - Cryptographic Hardware and Embedded Systems - CHES 2015, 16th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings. |
|
|
|
2014 |
Thomas Korak, Michael Hutter - "On the Power of Active Relay Attacks using Custom-Made Proxies" - IEEE International Conference on RFID - IEEE RFID 2014, Orlando, Florida, USA, April 8-10. Proceedings. |
|
|
|
2014 |
Gesine Hinterwälder, Amir Moradi, Michael Hutter, Peter Schwabe, Christof Paar - "Full-Size High-Security ECC Implementation on MSP430 Microcontrollers" - Latincrypt 2014 - 3rd International Workshop, Florianopolis, Brazil, September 17-19, Proceedings. |
|
|
|
2014 |
Peter Pessl, Michael Hutter - "Curved Tags - A Low-Resource ECDSA Implementation tailored for RFID" - Workshop on RFID Security - RFIDsec 2014, 10th Workshop, Oxford, UK, July 21 -23, 2014, Proceedings. |
|
|
|
2014 |
Oliver Söll, Thomas Korak, Michael Mühlberghuber, Michael Hutter - "EM-Based Detection of Hardware Trojans on FPGAs" - IEEE International Symposium on Hardware-Oriented Security and Trust -- HOST 2014, Arlington, Virginia, USA, May 6-7 |
|
|
|
2014 |
Hannes Groß, Erich Wenger, Honorio Martín, Michael Hutter - "PIONEER - a Prototype for the Internet of Things based on an Extendable EPC Gen2 RFID Tag" - Workshop on RFID Security - RFIDsec 2014, 10th Workshop, Oxford, UK, July 21 -23, 2014, Proceedings. |
|
|
|
2014 |
Wolfgang Wieser, Michael Hutter - "Efficient Multiplication on Low-Resource Devices" - Euromicro Conference on Digital System Design Architectures, Methods and Tools -- DSD 2014, Verona, Italy, August, 27-29, 2014, Proceedings |
|
|
|
2014 |
Thomas Korak, Michael Hutter, Baris Ege, Lejla Batina - "Clock Glitch Attacks in the Presence of Heating" - Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2014, Busan, Korea, September 23, 2014, Proceedings |
|
|
|
2013 |
Elke De Mulder, Michael Hutter, Mark Marson, Peter Pearson - "Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA" - Cryptographic Hardware and Embedded Systems - CHES 2013, 14th International Workshop, Santa Barbara, California, USA, August 20-23, 2013, Proceedings. |
|
|
|
2013 |
Peter Pessl, Michael Hutter - "Pushing The Limits of SHA-3 Hardware Implementations to Fit on RFID" - Cryptographic Hardware and Embedded Systems - CHES 2013, 14th International Workshop, Santa Barbara, California, USA, August 20-23, 2013, Proceedings. |
|
|
|
2013 |
Michael Hutter, Peter Schwabe - "NaCl on 8-bit AVR Microcontrollers" - Progress in Cryptology – AFRICACRYPT 2013 Sixth International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings. |
|
|
|
2013 |
Roman Silberschneider, Thomas Korak, Michael Hutter - "Access Without Permission: A Practical RFID Relay Attack " - Austrochip 2013, 21st Austrian Workshop on Microelectronics, Linz, Austria, October 10, 2013, Proceedings |
|
|
|
2013 |
Michael Muehlberghuber, Frank K. Gurkaynak, Thomas Korak, Philipp Dunst, Michael Hutter - "Red Team vs. Blue Team Hardware Trojan Analysis: Detection of a Hardware Trojan on an Actual ASIC" - Hardware and Architectural Support for Security and Privacy - HASP 2013, Second Workshop, Tel-Aviv, Israel, June 23, 2013, Proceedings. |
|
|
|
2013 |
Michael Hutter, Jörn-Marc Schmidt - "The Temperature Side-Channel and Heating Fault Attacks" - Smart Card Research and Advanced Applications - CARDIS 2013, 12th International Conference, Berlin, Germany, November 27-29, 2013, Proceedings. |
|
|
|
2012 |
Thomas Korak, Thomas Plos, Michael Hutter - "Attacking an AES-enabled NFC Tag - Implications from Design to a Real-World Scenario" - 3rd International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt, Germany, 3. - 4. May, 2012, Proceedings. |
|
|
|
2012 |
Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Stefan Mangard - "Exploiting the Difference of Side-Channel Leakages" - Constructive Side-Channel Analysis and Secure Design - COSADE 2012, 3rd International Workshop, Darmstadt, Germany, May 3-4, 2012, Proceedings. |
|
|
|
2012 |
Nashwa A. F. Mohammed, Mohsin H. A. Hashim, Michael Hutter - "Improved Fixed-base Comb Method for Fast Scalar Multiplication" - Progress in Cryptology – AFRICACRYPT 2012 Fifth International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings |
|
|
|
2012 |
Markus Pelnar, Michael Mühlberghuber, Michael Hutter - "Putting Together What Fits Together - GrAEStl" - Smart Card Research and Advanced Applications - CARDIS 2012, 11th International Conference, Graz, Austria, November 28–30, 2012, Proceedings. |
|
|
|
2011 |
Michael Hutter, Erich Wenger - "Fast Multi-Precision Multiplication for Public-Key Cryptography on Embedded Microprocessors" - Cryptographic Hardware and Embedded Systems - CHES 2011, 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings. |
|
|
|
2011 |
Wolfgang Issovits, Michael Hutter - "Weaknesses of the ISO/IEC 14443 Protocol Regarding Relay Attacks" - Conference on RFID-Technologies and Applications - RFID-TA 2011, IEEE International Conference, Barcelona, Spain, September 15-16, 2011, Proceedings. |
|
|
|
2011 |
Erich Wenger, Michael Hutter - "A Hardware Processor Supporting Elliptic Curve Cryptography for Less Than 9 kGEs" - Smart Card Research and Advanced Applications |
|
|
|
2011 |
Erich Wenger, Michael Hutter - "Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations" - Information Security Technology for Applications - 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers |
|
|
|
2011 |
Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer - "A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES like Sardines" - Information Security Theory and Practices - WISTP 2011, 5th International Workshop, Heraklion, Greece, June 1-3, 2011, Proceedings. |
|
|
|
2011 |
Michael Hutter, Marc Joye, Yannick Sierra - "Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation" - Progress in Cryptology – AFRICACRYPT 2011 Fourth International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings |
|
|
|
2011 |
Christian Pendl, Markus Pelnar, Michael Hutter - "Elliptic Curve Cryptography on the WISP UHF RFID Tag" - Workshop on RFID Security - RFIDsec 2011, 7th Workshop, Amherst, Massachusetts, USA, June 26-28, 2011, Proceedings |
|
|
|
2010 |
Jörn-Marc Schmidt, Thomas Plos, Mario Kirschbaum, Michael Hutter, Marcel Medwed, Christoph Herbst - "Side-Channel Leakage Across Borders" - Smart Card Research and Advanced Applications 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010 |
|
|
|
2010 |
Michael Hutter, Ronald Tögl - "A Trusted Platform Module for Near Field Communication" - Conference on Systems and Networks Communications - ICSNC 2010, 5th International Conference, Nice, France, August 22-27, 2010, Proceedings. |
|
|
|
2010 |
Martin Feldhofer, Manfred Josef Aigner, Michael Hutter, Thomas Plos, Erich Wenger, Thomas Baier - "Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags" - Workshop on RFID / USN Security and Cryptography |
|
|
|
2010 |
Michael Hutter, Martin Feldhofer, Thomas Plos - "An ECDSA Processor for RFID Authentication" - Workshop on RFID Security - RFIDsec 2010, 6th Workshop, Istanbul, Turkey, June 7-9, 2010, Proceedings |
|
|
|
2009 |
Christoph Nagl, Michael Hutter - "Coupon Recalculation for the Schnorr and GPS Identification Scheme: A Performance Evaluation" - Workshop on RFID Security 2009 - RFIDSec 2009, 5th edition, Leuven, Belgium, June 30-July 2, 2009 |
|
|
|
2009 |
Michael Hutter - "RFID Authentication Protocols based on Elliptic Curves: A Top-Down Evaluation Survey" - International Conference on Security and Cryptography - SECRYPT 2009, it is part of ICETE - The International Joint Conference on e-Business and Telecommunications, Milan, Italy, July 7-10, 2009, Proceedings |
|
|
|
2009 |
Michael Hutter, Alexander Szekely, Johannes Wolkerstorfer - "Embedded System Management using WBEM" - Integrated Network Management - IM 2009, 11th IFIP/IEEE International Symposium, New York, USA, June 1-5, 2009, Proceedings |
|
|
|
2009 |
Michael Hutter, Thomas Plos, Jörn-Marc Schmidt - "Contact-Based Fault Injections and Power Analysis on RFID Tags" - European Conference on Circuit Theory and Design - ECCTD 2009, 19th IEEE European Conference, Antalya, Turkey, August 23-27, 2009, Proceedings |
|
|
|
2009 |
Michael Hutter, Marcel Medwed, Daniel Hein, Johannes Wolkerstorfer - "Attacking ECDSA-Enabled RFID Devices" - Applied Cryptography and Network Security - ACNS 2009, 7th International Conference, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings |
|
|
|
2009 |
Thomas Plos, Michael Hutter, Martin Feldhofer - "On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices" - Workshop on Information Security Applications - WISA 2009, Busan, Korea, August 25-27, 2009, Proceedings |
|
|
|
2009 |
Jörn-Marc Schmidt, Michael Hutter, Thomas Plos - "Optical Fault Attacks on AES: A Threat in Violet" - 6th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2009 |
|
|
|
2008 |
Thomas Lorünser, Edwin Querasser, Thomas Matyus, Momtchil Peev, Johannes Wolkerstorfer, Michael Hutter, Alexander Szekely, Ilse Wimberger, Christian Pfaffel-Janser, Andreas Neppach - "Security Processor with Quantum Key Distribution" - Proceedings of the 19th International Conference on Application-Specific Systems, Architectures and Processors |
|
|
|
2008 |
Michael Hutter, Jörn-Marc Schmidt, Thomas Plos - "RFID and Its Vulnerability to Faults" - Cryptographic Hardware and Embedded Systems – CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008, Proceedings |
|
|
|
2008 |
Thomas Plos, Michael Hutter, Christoph Herbst - "Enhancing Side-Channel Analysis with Low-Cost Shielding Techniques" - Proceedings of Austrochip 2008, Linz, Austria, October 8, 2008, Proceedings |
|
|
|
2008 |
Thomas Plos, Michael Hutter, Martin Feldhofer - "Evaluation of Side-Channel Preprocessing Techniques on Cryptographic-Enabled HF and UHF RFID-Tag Prototypes" - Workshop on RFID Security 2008, Budapest, Hungary, July 9-11, 2008 |
|
|
|
2007 |
Jörn-Marc Schmidt, Michael Hutter - "Optical and EM Fault-Attacks on CRT-based RSA: Concrete Results" - Austrochip 2007, 15th Austrian Workhop on Microelectronics, 11 October 2007, Graz, Austria, Proceedings |
|
|
|
2007 |
Michael Hutter, Stefan Mangard, Martin Feldhofer - "Power and EM Attacks on Passive 13.56 MHz RFID Devices" - Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings |
|
|
|
Part of a book |
2012 |
Michael Hutter, Erich Wenger, Markus Pelnar, Christian Pendl - "Elliptic Curve Cryptography on WISPs book title: Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID" |
|
|
|
Journal Articles |
2020 |
Michael Hutter, Erich Wenger - "Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors" - Journal of Cryptology |
|
|
|
2020 |
Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark E. Marson - "Low-Latency Hardware Masking with Application to AES" - IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2020, Proceedings. |
|
|
|
2019 |
Michael Hutter, Michael Tunstall - "Constant-time higher-order Boolean-to-arithmetic masking" - Journal of Cryptographic Engineering |
|
|
|
2018 |
Michael Hutter, Erich Wenger - "Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors" - Journal of Cryptology |
|
|
|
2015 |
Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sanchez, Peter Schwabe: - "High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers" - Designs, Codes and Cryptography |
|
|
|
2015 |
Michael Hutter, Peter Schwabe: - "Multiprecision multiplication on AVR revisited" - Journal of Cryptographic Engineering (Volume 5) |
|
|
|
2015 |
Honorio Martin, Thomas Korak, Enrique San Millan, Michael Hutter - "Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness" - IEEE Transactions on Information Forensics and Security (Volume: 10) |
|
|
|
2014 |
Elke De Mulder, Michael Hutter, Mark Marson, Peter Pearson - "Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA: Extended Version" - Journal of Cryptographic Engineering (Volume: 4) |
|
|
|
2013 |
Thomas Plos, Michael Hutter, Martin Feldhofer, Maksimiljan Stiglic, Francesco Cavaliere - "Security-enabled NFC Tag with Flexible Architecture Supporting Asymmetric Cryptography" - IEEE Transactions on Very Large Scale Integration (VLSI) Systems (Volume: 21) |
|
|
|
2012 |
Thomas Plos, Manfred Aigner, Thomas Baier, Martin Feldhofer, Michael Hutter, Thomas Korak, Erich Wenger - "Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags" - International Journal of RFID Security and Cryptography (Volume: 1) |
|
|
|
2011 |
Michael Hutter, Ronald Tögl - "Touch'n Trust: An NFC-Enabled Trusted Platform Module" - International Journal on Advances in Security (Volume: 4) |
|
|
|
2011 |
Ronald Tögl, Michael Hutter - "An Approach to Introducing Locality in Remote Attestation using Near Field Communications" - The Journal of Supercomputing (Volume: 55) |
|
|
|
2010 |
Michael Hutter, Thomas Plos, Martin Feldhofer - "On the Security of RFID Devices against Implementation Attacks" - International Journal of Security and Networks (Volume: 5 2/3) |
|
|
|
Technical Reports and Preprints |
2014 |
Michael Hutter and Peter Schwabe - "Multiprecision multiplication on AVR revisited" - Cryptology ePrint Archive, https://eprint.iacr.org/2014/592.pdf. |
|
|
|
2011 |
Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt - "Test Apparatus for Side-Channel Resistance Compliance Testing" - Non-Invasive Attack Testing Workshop - NIAT 2011, International Workshop, Nara, Japan, September 26-27, 2011. |
|
|
|
2011 |
Ivan Gudymenko, Michael Hutter - "Security in the Internet of Things" - Intensive Program on Information Communication Security, IPICS Summer School, Korfu, Greece, 22-31 August |
|
|
|
Dissertation Thesis |
2011 |
Michael Hutter - "Secure and Efficient Implementation of RFID Tags Supporting Cryptography" |
|
|
|
Master Thesis |
2007 |
Michael Hutter - "EM Side-Channel Attacks on Cryptographic Devices" |
|
|
|
|
|
|