Design, implementation, and evaluation of a vehicular hardware security module M Wolf, T Gendrullis Information Security and Cryptology-ICISC 2011: 14th International …, 2012 | 210 | 2012 |
A real-world attack breaking A5/1 within hours T Gendrullis, M Novotný, A Rupp Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008 | 84 | 2008 |
Secure on-board architecture specification B Weyl, M Wolf, F Zweers, T Gendrullis, MS Idrees, Y Roudier, ... Evita Deliverable D 3, 2, 2010 | 67 | 2010 |
Securing car2X applications with effective hardware software codesign for vehicular on-board networks H Schweppe, B Weyl, Y Roudier, MS Idrees, T Gendrullis, M Wolf, ... VDI Automotive Security 27, 2011 | 26 | 2011 |
Hardware-Based Cryptanalysis of the GSM A5/1 Encryption Algorithm T Gendrullis, IC Paar Diploma thesis, Ruhr-University Bochum, 2008 | 5 | 2008 |
A Lightweight Hardware Implementation of the Stream Cipher VEST-4 T Gendrullis, T Kasper, C Paar Western European Workshop on Research in Cryptology, 72, 2007 | 1 | 2007 |
Deliverable D3. 2: Secure On-board Architecture Specification B Weyl, M Wolf, F Zweers, T Gendrullis, MS Idrees, Y Roudier, ... | | 2011 |
Secure On-board Architecture Specification, Deliverable D3. 2 H Seudié, J Shokrollahi, B Weyl, A Keil, M Wolf, F Zweers, T Gendrullis, ... Telecom ParisTech, 2010 | | 2010 |
Deliverable D4. 0.3: Security Architecture Implementation–Progress Report H Platzdasch, T Gendrullis, M Wolf, C Fischer, W Wiewesiek, H Seudié, ... | | |