


default search action
Max Hoffmann 0001
Person information
- affiliation: Ruhr-University Bochum, Germany
Other persons with the same name
- Max Hoffmann 0002 — RWTH Aachen University, Germany
- Max Hoffmann 0003 — Heidelberg University, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j8]Susanne Engels
, Max Hoffmann, Christof Paar:
A critical view on the real-world security of logic locking. J. Cryptogr. Eng. 12(3): 229-244 (2022) - 2021
- [j7]Max Hoffmann
, Christof Paar:
Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflaging. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 82-108 (2021) - [j6]Max Hoffmann
, Falk Schellenberg
, Christof Paar
:
ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries. IEEE Trans. Inf. Forensics Secur. 16: 1058-1073 (2021) - [i12]Max Hoffmann, Falk Schellenberg, Christof Paar:
ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries. CoRR abs/2105.13769 (2021) - 2020
- [b1]Max Hoffmann:
Security and subvertability of modern hardware: a journey through selected layers of hardware security. Ruhr University Bochum, Germany, 2020 - [j5]Max Hoffmann
, Michael Klooß
, Markus Raiber
, Andy Rupp
:
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices. Proc. Priv. Enhancing Technol. 2020(1): 165-194 (2020) - [j4]Valerie Fetzer
, Max Hoffmann
, Matthias Nagel, Andy Rupp
, Rebecca Schwerdt
:
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection. Proc. Priv. Enhancing Technol. 2020(3): 62-152 (2020) - [j3]Nils Albartus
, Max Hoffmann
, Sebastian Temme, Leonid Azriel, Christof Paar:
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4): 309-336 (2020) - [i11]Max Hoffmann, Christof Paar:
Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging. IACR Cryptol. ePrint Arch. 2020: 750 (2020) - [i10]Nils Albartus, Max Hoffmann, Sebastian Temme, Leonid Azriel, Christof Paar:
DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering. IACR Cryptol. ePrint Arch. 2020: 751 (2020)
2010 – 2019
- 2019
- [j2]Marc Fyrbiak
, Sebastian Wallat, Pawel Swierczynski
, Max Hoffmann
, Sebastian Hoppach
, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
:
HAL - The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion. IEEE Trans. Dependable Secur. Comput. 16(3): 498-510 (2019) - [c5]Carina Wiesen, Nils Albartus
, Max Hoffmann
, Steffen Becker
, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel
, Christof Paar:
Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights. ASP-DAC 2019: 104-111 - [c4]Max Hoffmann
, Michael Klooß
, Andy Rupp
:
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited. CCS 2019: 2093-2110 - [c3]Sebastian Wallat, Nils Albartus
, Steffen Becker
, Max Hoffmann
, Maik Ender
, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar:
Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework. CF 2019: 392-397 - [i9]Carina Wiesen, Nils Albartus, Max Hoffmann, Steffen Becker, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel, Christof Paar:
Towards Cognitive Obfuscation: Impeding Hardware Reverse Engineering Based on Psychological Insights. CoRR abs/1910.00323 (2019) - [i8]Sebastian Wallat, Nils Albartus, Steffen Becker, Max Hoffmann, Maik Ender, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar:
Highway to HAL: Open-Sourcing the First Extendable Gate-Level Netlist Reverse Engineering Framework. CoRR abs/1910.00350 (2019) - [i7]Max Hoffmann, Christof Paar:
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead. CoRR abs/1910.00949 (2019) - [i6]Susanne Engels, Max Hoffmann, Christof Paar:
The End of Logic Locking? A Critical View on the Security of Logic Locking. IACR Cryptol. ePrint Arch. 2019: 796 (2019) - [i5]Max Hoffmann, Michael Klooß, Andy Rupp
:
Efficient zero-knowledge arguments in the discrete log setting, revisited. IACR Cryptol. ePrint Arch. 2019: 944 (2019) - [i4]Max Hoffmann, Michael Klooß, Markus Raiber, Andy Rupp
:
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices. IACR Cryptol. ePrint Arch. 2019: 1199 (2019) - 2018
- [j1]Max Hoffmann
, Christof Paar:
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 277-297 (2018) - [i3]Max Hoffmann, Valerie Fetzer, Matthias Nagel, Andy Rupp
, Rebecca Schwerdt:
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection. IACR Cryptol. ePrint Arch. 2018: 1106 (2018) - 2017
- [c2]Gottfried Herold, Max Hoffmann
, Michael Klooß
, Carla Ràfols
, Andy Rupp
:
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs. CCS 2017: 1547-1564 - [c1]Gunnar Hartung, Max Hoffmann
, Matthias Nagel, Andy Rupp
:
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection. CCS 2017: 1925-1942 - [i2]Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar:
HAL- The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion. IACR Cryptol. ePrint Arch. 2017: 783 (2017) - [i1]Gottfried Herold, Max Hoffmann, Michael Klooß, Carla Ràfols, Andy Rupp
:
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs. IACR Cryptol. ePrint Arch. 2017: 802 (2017)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint