Publications & Deliverables

 

Toolbox

2015

Source code release of a ECC Library in C

Source code release of a ECC Breaker

Source code release of a Pairing Library in C

 

Publications

2016

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

V. van der Veen, Y. Fratantonio, M. Lindorfer, D. Gruss, C. Maurice, G. Vigna, H. Bos, K. Razavi, C. Giuffrida, CCS 2016, Vienna, Austria, October 25 - October 27, 2016

Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR

D. Gruss, C. Maurice, A. Fogh, M. Lipp, S. Mangard, CCS 2016, Vienna, Austria, October 25 - October 27, 2016

Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions

G. Fuchsbauer, C. Hanser, C. Kamath, D. Slamanig, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016

DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks

P. Pessl, D. Gruss, C. Maurice, M. Schwarz, S. Mangard, USENIX 2016, Austin (Texas), USA, August 10 - 12, 2016

ARMageddon: Cache Attacks on Mobile Devices

M. Lipp, D. Gruss, R. Spreitzer, C. Maurice, S. Mangard, USENIX 2016, Austin (Texas), USA, August 10 - 12, 2016

Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android

R. Spreitzer, S. Griesmayr, T. Korak, S. Mangard, WiSec 2016, Darmstadt, Germany, July 18 - 20, 2016.

Flush+Flush: A Fast and Stealthy Cache Attack

D. Gruss, C. Maurice, and S. Mangard, DIMVA 2016, Donostia-San Sebastián, Spain, July 7 - 8, 2016

Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials

G. Fuchsbauer, C. Hanser, and D. Slamanig, submitted to Journal of Cryptology, 2016

Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript

D. Gruss, C. Maurice, and S. Mangard, DIMVA 2016, Donostia-San Sebastián, Spain, July 7 - 8, 2016

Trusted Sensors for Participatory Sensing and IoT Applications based on Physically Unclonable Functions

I. Haider, M. Höberl, B. Rinner, Workshop on IoT Privacy, Trust, and Security (IoTPTS’ 16), Xi'an, China, May 30, 2016

Towards a Secure Key Generation and Storage Framework on Resource-Constrained Sensor Nodes

M. Höberl, I. Haider, B. Rinner, NextMote 2016, Graz, Austria, February 15 - 17, 2016

2015

A New Approach To Efficient Revocable Attribute-Based Anonymous Credentials

D. Derler, C. Hanser, D. Slamanig, IMACC 2015, Oxford, United Kingdom, December 15 - 17, 2015

Verifiably Encrypted Signatures: Security Revisited and a New Construction

C. Hanser, M. Rabkin, D. Schröder, ESORICS 2015, Vienna, Austria, September 21 - 25, 2015

Practical Round-Optimal Blind Signatures in the Standard Model

G. Fuchsbauer, C. Hanser, D. Slamanig, CRYPTO 2015, Santa Barbara, USA, August 16 - 20, 2015

Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs

E. Wenger, P. Wolfger, Journal of Cryptographic Engineering, 2015

Suit up! Made-to-Measure Hardware Implementations of Ascon

H. Gross, E. Wenger, C. Dobraunig, C. Ehrenhöfer, DSD 2015, Funchal, Portugal, August 26-28, 2015

Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC

M. Mühlberghuber, T. Korak, M. Hutter, P. Dunst, COSADE 2015, Berlin, Germany, April 13-14, 2015

2014

On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms

T. Korak, M. Höfler, Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2014, Busan, Korea, September 23, 2014

Clock Glitch Attacks in the Presence of Heating

T. Korak, M. Hutter, B. Ege, L. Batina, Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2014, Busan, Korea, September 23, 2014

Efficient Pairings and ECC for Embedded Systems

T. Unterluggauer, E. Wenger, Cryptographic Hardware and Embedded Systems - CHES 2014, Busan, Korea, September 23, 2014

Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices

T. Unterluggauer, E. Wenger, International Conference on Availability, Reliability and Security - ARES 2014, Fribourg, Switzerland, September 8, 2014

Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster

E. Wenger, P. Wolfger, Selected Areas in Cryptography - SAC 2014, Montreal, Canada, August 15, 2014

find additional information at wikipedia

Location-dependent EM Leakage of the ATxmega Microcontroller

T. Korak, The 7th International Symposium on Foundations & Practice of Security - FPS' 2014, Montreal, Canada, 3rd-5th November 2014

 

Deliverables

Released:

D7.6 3rd periodic report - publishable summary

due date: October 2016 – M36

D7.5 2nd periodic report - publishable summary

due date: October 2015 - M24

D2.1 Report on Multiple Secure Elements

due date: August 2015 - M22

D3.2 Report on Antenna Designs

due date: June 2015 - M20

D7.2 Updated Plan and Initial Report on Dissemination and Exploitation

due date: June 2015 - M20

D3.1 Report on Active Transmission Technology

due date: November 2014 - M13

D7.4 1st periodic report - publishable summary

due date: October 2014 – M12

D1.2 Report on MATTHEW Platform Specifications

due date: August 2014 - M10

D1.1 Report on Use Case and System Architecture Requirements

due date: March 2014 - M05

D7.1 Project IT infrastructure

due date: January 2014 – M03

Submitted:

D4.1 Payment application for demonstration purposes available

due date: April 2016 - M30

D4.2 High Security Access control system with multiple security modules

due date: April 2016 - M30

D4.3 Cryptographic API for ABC-based applications

due date: April 2016 - M30

D2.2 Report on Privacy Algorithms and their Implementation

due date: June 2016 - M32

D5.1 Report on integration into form factors

due date: June 2016 - M32

D5.2 Prototype for payment application

due date: June 2016 - M32

D5.3 Prototype for enhanced access control

due date: June 2016 - M32

D5.4 Prototype for privacy-preserving access to remote services

due date: June 2016 - M32

D2.3 Report on PUF technology and cloneable Identity

due date: August 2016 - M34

D6.1 Report on contactless performance

due date: August 2016 - M34

D7.3 Final report on Dissemination and Exploitation

due date: September 2016 - M35

Upcoming:

D6.2 Report on application testing and evaluation

due date: October 2016 - M36

D6.3 Report on standardisation activities

due date: October 2016 - M36

D7.6 Third report according to EC regulations of the model contract

due date: October 2016 - M36

D7.7 Final Project Report

due date: October 2016 - M36

Disclaimer - Legal Notice - Privacy

©2022  MATTHEW Project | MATTHEW is coordinated by Infineon Technologies Austria AG