Sandeep S. Kumar
Sandeep S. Kumar
R&D Manager, Signify Research
Geverifieerd e-mailadres voor signify.com
Titel
Geciteerd door
Geciteerd door
Jaar
FPGA intrinsic PUFs and their use for IP protection
J Guajardo, SS Kumar, GJ Schrijen, P Tuyls
International workshop on Cryptographic Hardware and Embedded Systems, 63-80, 2007
12072007
The butterfly PUF protecting IP on every FPGA
SS Kumar, J Guajardo, R Maes, GJ Schrijen, P Tuyls
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 67-70, 2008
7122008
A survey of lightweight-cryptography implementations
T Eisenbarth, S Kumar, C Paar, A Poschmann, L Uhsadel
IEEE Design & Test of Computers 24 (6), 522-533, 2007
5402007
Security Challenges in the IP-based Internet of Things
T Heer, O Garcia-Morchon, R Hummen, SL Keoh, SS Kumar, K Wehrle
Wireless Personal Communications 61 (3), 527-542, 2011
4112011
Securing the internet of things: A standardization perspective
SL Keoh, SS Kumar, H Tschofenig
IEEE Internet of Things Journal 1 (3), 265-275, 2014
4092014
Physical unclonable functions and public-key crypto for FPGA IP protection
J Guajardo, SS Kumar, GJ Schrijen, P Tuyls
2007 International Conference on Field Programmable Logic and Applications …, 2007
2862007
Breaking ciphers with COPACOBANA–a cost-optimized parallel code breaker
S Kumar, C Paar, J Pelzl, G Pfeiffer, M Schimmler
International Workshop on Cryptographic Hardware and Embedded Systems, 101-118, 2006
1852006
Are standards compliant elliptic curve cryptosystems feasible on RFID
S Kumar, C Paar
Workshop on RFID Security, 12-14, 2006
1502006
Security Considerations in the IP-based Internet of Things
O Garcia-Morchon, S Kumar, R Struik, S Keoh, R Hummen
1272013
Optimum digit serial GF (2^ m) multipliers for curve-based cryptography
S Kumar, T Wollinger, C Paar
IEEE Transactions on Computers 55 (10), 1306-1311, 2006
1242006
Efficient GF (p m) arithmetic architectures for cryptographic applications
G Bertoni, J Guajardo, S Kumar, G Orlando, C Paar, T Wollinger
Cryptographers’ Track at the RSA Conference, 158-175, 2003
1052003
Securing the IP-based internet of things with HIP and DTLS
O Garcia-Morchon, SL Keoh, S Kumar, P Moreno-Sanchez, F Vidal-Meca, ...
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
1022013
End-to-end transport security in the IP-based internet of things
M Brachmann, SL Keoh, OG Morchon, SS Kumar
2012 21st International Conference on Computer Communications and Networks …, 2012
1012012
Identification of devices using physically unclonable functions
JG Merchan, SS Kumar, PT Tuyls, GJ Schrijen
US Patent App. 12/674,367, 2011
90*2011
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
J Guajardo, B Škorić, P Tuyls, SS Kumar, T Bel, AHM Blom, GJ Schrijen
Information Systems Frontiers 11 (1), 19-41, 2009
842009
Brand and IP protection with physical unclonable functions
J Guajardo, SS Kumar, GJ Schrijen, P Tuyls
2008 IEEE International Symposium on Circuits and Systems, 3186-3189, 2008
772008
Efficient hardware implementation of finite fields with applications to cryptography
J Guajardo, T Güneysu, SS Kumar, C Paar, J Pelzl
Acta Applicandae Mathematica 93 (1-3), 75-118, 2006
622006
Elliptic curve cryptography for constrained devices
SS Kumar
Verlag nicht ermittelbar, 2006
592006
How to Break DES for BC 8,980
S Kumar, C Paar, J Pelzl, G Pfeiffer, A Rupp, M Schimmler
SHARCS ‘06–Special-purpose Hardware for Attacking Cryptographic Systems, 17-35, 2006
522006
Embedded end-to-end wireless security with ECDH key exchange
S Kumar, M Girimondo, A Weimerskirch, C Paar, A Patel, AS Wander
2003 46th Midwest Symposium on Circuits and Systems 2, 786-789, 2003
472003
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20