Follow
Pawel Swierczynski
Pawel Swierczynski
Verified email at rub.de - Homepage
Title
Cited by
Cited by
Year
Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering
A Moradi, D Oswald, C Paar, P Swierczynski
Proceedings of the ACM/SIGDA international symposium on Field programmable …, 2013
1282013
FPGA Trojans through detecting and weakening of cryptographic primitives
P Swierczynski, M Fyrbiak, P Koppe, C Paar
Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions …, 2015
1092015
Hal-the missing piece of the puzzle for hardware reverse engineering, trojan detection and insertion
M Fyrbiak, S Wallat, P Swierczynski, M Hoffmann, S Hoppach, M Wilhelm, ...
IEEE Transactions on Dependable and Secure Computing, 2018
942018
Interdiction in Practice–Hardware Trojan Against a High-Security USB Flash Drive
P Swierczynski, M Fyrbiak, P Koppe, A Moradi, C Paar
63*
Bitstream Fault Injections (BiFI)–Automated Fault Attacks against SRAM-based FPGAs
P Swierczynski, GT Becker, A Moradi, C Paar
58*
Physical security evaluation of the bitstream encryption mechanism of Altera Stratix II and Stratix III FPGAs
P Swierczynski, A Moradi, D Oswald, C Paar
ACM Transactions on Reconfigurable Technology and Systems (TRETS) 7 (4), 34, 2015
512015
Insights into the mind of a trojan designer: the challenge to integrate a trojan into the bitstream
M Ender, P Swierczynski, S Wallat, M Wilhelm, PM Knopp, C Paar
Proceedings of the 24th Asia and South Pacific Design Automation Conference …, 2019
442019
Protecting against Cryptographic Trojans in FPGAs
P Swierczynski, M Fyrbiak, C Paar, C Huriaux, R Tessier
Field-Programmable Custom Computing Machines (FCCM), 2015 IEEE 23rd Annual …, 2015
282015
Bitstream-based attacks against reconfigurable hardware
P Swierczynski
Ruhr-Universität Bochum, 2018
52018
Keccak und der SHA-2
P Swierczynski, G Leander, C Paar
Datenschutz und Datensicherheit-DuD 37 (11), 712-719, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–10