default search action
Bernhard Jungk
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j4]Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 269-306 (2020) - [c16]Prashanth Mohan, Wen Wang, Bernhard Jungk, Ruben Niederhagen, Jakub Szefer, Ken Mai:
ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS. ICCD 2020: 656-662 - [i6]Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. IACR Cryptol. ePrint Arch. 2020: 54 (2020)
2010 – 2019
- 2019
- [j3]Bernhard Jungk, Marc Stöttinger:
Serialized lightweight SHA-3 FPGA implementations. Microprocess. Microsystems 71 (2019) - [c15]Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen:
XMSS and Embedded Systems. SAC 2019: 523-550 - 2018
- [j2]Bernhard Jungk, Richard Petri, Marc Stöttinger:
Efficient Side-Channel Protections of ARX Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 627-653 (2018) - [c14]David Berend, Shivam Bhasin, Bernhard Jungk:
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting. ARES 2018: 54:1-54:10 - [c13]Zakaria Najm, Dirmanto Jap, Bernhard Jungk, Stjepan Picek, Shivam Bhasin:
On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers. APCCAS 2018: 552-555 - [c12]Prasanna Ravi, Bernhard Jungk, Dirmanto Jap, Zakaria Najm, Shivam Bhasin:
Feature Selection Methods for Non-Profiled Side-Channel Attacks on ECC. DSP 2018: 1-5 - [c11]David Berend, Bernhard Jungk, Shivam Bhasin:
Guessing Your PIN Right: Unlocking Smartphones with Publicly Available Sensor Data. ISVLSI 2018: 363-368 - [i5]Bernhard Jungk, Richard Petri, Marc Stöttinger:
Efficient Side-Channel Protections of ARX Ciphers. IACR Cryptol. ePrint Arch. 2018: 693 (2018) - [i4]Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen:
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V. IACR Cryptol. ePrint Arch. 2018: 1225 (2018) - 2017
- [c10]Bernhard Jungk, Shivam Bhasin:
Don't fall into a trap: Physical side-channel analysis of ChaCha20-Poly1305. DATE 2017: 1110-1115 - [i3]David Berend, Bernhard Jungk, Shivam Bhasin:
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting. IACR Cryptol. ePrint Arch. 2017: 1169 (2017) - 2016
- [b1]Bernhard Jungk:
FPGA-based evaluation of cryptographic algorithms. Goethe University Frankfurt am Main, 2016 - [c9]Bernhard Jungk:
Automotive security state of the art and future challenges. ISIC 2016: 1-4 - [c8]Marc Stöttinger, Bernhard Jungk:
There ain't no plain key: A PUF based first-order side-channel resistant encryption construction. ISIC 2016: 1-4 - [c7]Bernhard Jungk, Marc Stöttinger:
Hobbit - Smaller but faster than a dwarf: Revisiting lightweight SHA-3 FPGA implementations. ReConFig 2016: 1-7 - 2014
- [c6]Bernhard Jungk, Leandro Rodrigues Lima, Matthias Hiller:
A systematic study of lightweight hash functions on FPGAs. ReConFig 2014: 1-6 - 2013
- [c5]André Himmighofen, Bernhard Jungk, Steffen Reith:
On a FPGA-based method for authentication using Edwards curves. ReCoSoC 2013: 1-7 - [c4]Bernhard Jungk, Marc Stöttinger:
Among slow dwarfs and fast giants: A systematic design space exploration of KECCAK. ReCoSoC 2013: 1-8 - 2012
- [c3]Bernhard Jungk, Marc Stöttinger, Jan Gampe, Steffen Reith, Sorin A. Huss:
Side-channel resistant AES architecture utilizing randomized composite field representations. FPT 2012: 125-128 - 2011
- [c2]Bernhard Jungk, Jürgen Apfelbeck:
Area-Efficient FPGA Implementations of the SHA-3 Finalists. ReConFig 2011: 235-241 - 2010
- [c1]Bernhard Jungk, Steffen Reith:
On FPGA-Based Implementations of the SHA-3 Candidate Grøstl. ReConFig 2010: 316-321 - [i2]Bernhard Jungk, Steffen Reith:
On FPGA-based implementations of Gröstl. IACR Cryptol. ePrint Arch. 2010: 260 (2010)
2000 – 2009
- 2009
- [j1]Bernhard Jungk:
Selbstorganisierendes Service Level Management basierend auf Mechanismus-Design. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 17 (2009) - [i1]Bernhard Jungk, Steffen Reith, Jürgen Apfelbeck:
On Optimized FPGA Implementations of the SHA-3 Candidate Groestl. IACR Cryptol. ePrint Arch. 2009: 206 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint