Utilizing hard cores of modern FPGA devices for high-performance cryptography

2010 - Tim Güneysu

Journal of Cryptographic Engineering, Volume 1, Number 1, 37-55, DOI: 10.1007/s13389-011-0002-2 [Link]

Efficient Secure Two-Party Computation with Untrusted Hardware Tokens

2010 - Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider

In Towards Hardware-Intrinsic Security: Foundations and Practice, Information Security and Cryptography, Springer-Verlag, September 2010.

From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design

2010 - Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider

Cryptology ePrint Archive: Report 2010/079 [PDF]

The ion energy distribution in dual radio frequency collisionless CCPs

2010 - Mohammed Shihab, Thomas Mussenbrock, Ralf Peter Brinkmann

DPG Früh­jahrs­ta­gung 2010, Han­no­ver, Ger­ma­ny 08-12 März, oral cont­ri­bu­ti­on

Em­bed­ded SFE: Off­loa­ding Ser­ver and Net­work using Hard­ware To­kens

2010 - Kimmo Jär­vi­nen, Vla­di­mir Ko­les­ni­kov, Ahmad-Reza Sadeghi, Thomas Schneider

14th In­ter­na­tio­nal Con­fe­rence on Fi­nan­ci­al Cryp­to­gra­phy and Data Se­cu­ri­ty (FC'10), Ja­nu­a­ry 25-28, Te­ne­ri­fe, Cana­ry Is­lands, Spain. [PDF]