| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2016 | A* | conf |
USENIX Security Symposium
|
| 2014 | C | conf |
WISTP
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
CRYPTO (1)
|
| 2013 | — | conf |
RFIDSec
|
| 2013 | — | — |
|
| 2013 | B | conf |
Selected Areas in Cryptography
|
| 2013 | J | jnl |
it Inf. Technol.
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | A* | conf |
CCS
|
| 2011 | J | jnl |
Datenschutz und Datensicherheit
|
| 2011 | J | jnl |
Datenschutz und Datensicherheit
|
| 2011 | — | conf |
RFIDSec
|
| 2011 | Misc | conf |
SoftCOM
|
| 2010 | J | jnl |
Trans. Comput. Sci.
|
| 2010 | — | conf |
Financial Cryptography
|
| 2010 | Misc | conf |
ICISC
|
| 2010 | — | conf |
LATINCRYPT
|
| 2009 | — | conf |
AFRICACRYPT
|
| 2009 | Misc | conf |
WISA
|
| 2009 | C | conf |
FDTC
|
| 2008 | J | jnl |
IEEE Trans. Computers
|
| 2008 | A* | conf |
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme.
CRYPTO
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | J | jnl |
Datenschutz und Datensicherheit
|
| 2007 | C | conf |
WISTP
|
| 2007 | A | conf |
CHES
|
| 2007 | — | conf |
OTM Conferences (2)
|