A highly regular and scalable AES hardware architecture S Mangard, M Aigner, S Dominikus IEEE Transactions on Computers 52 (4), 483-491, 2003 | 297 | 2003 |
Randomized addition-subtraction chains as a countermeasure against power attacks E Oswald, M Aigner Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001 | 191 | 2001 |
Power analysis tutorial M Aigner, E Oswald | 96 | 2000 |
mCoupons: An application for near field communication (NFC) S Dominikus, M Aigner 21st international conference on advanced information networking and …, 2007 | 93 | 2007 |
Secure symmetric authentication for RFID tags M Aigner, M Feldhofer Telecommunication and Mobile Computing, 2005 | 80 | 2005 |
A system of secure virtual coupons using NFC technology M Aigner, S Dominikus, M Feldhofer Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007 | 67 | 2007 |
Passive RFID technology for the Internet of Things S Dominikus, M Aigner, S Kraxberger 2010 International Conference for Internet Technology and Secured …, 2010 | 46 | 2010 |
Side channel analysis resistant design flow M Aigner, S Mangard, F Menichelli, R Menicocci, M Olivieri, T Popp, ... 2006 IEEE International Symposium on Circuits and Systems, 4 pp.-2912, 2006 | 37 | 2006 |
Semi-passive RFID development platform for implementing and attacking security tags M Feldhofer, M Aigner, T Baier, M Hutter, T Plos, E Wenger 2010 International Conference for Internet Technology and Secured …, 2010 | 31 | 2010 |
A novel CMOS logic style with data independent power consumption M Aigner, S Mangard, R Menicocci, M Olivieri, G Scotti, A Trifiletti 2005 IEEE International Symposium on Circuits and Systems, 1066-1069, 2005 | 28 | 2005 |
An application of RFID tags using secure symmetric authentication M Feldhofer, MJ Aigner, S Dominikus Proceedings of IEEE Security, Privacy and Trust in Pervasive and Ubiquitous …, 2005 | 25 | 2005 |
Semi-passive RFID development platform for implementing and attacking security tags T Plos, M Aigner, T Baier, M Feldhofer, M Hutter, T Korak, E Wenger International Journal of RFID Security and Cryptography 1 (1), 16-24, 2012 | 12 | 2012 |
Secure semi-passive RFID tags—prototype and analysis M Aigner, T Plos, ARS Coluccini Building Radio frequency IDentification for the Global Environment (BRIDGE …, 2008 | 9 | 2008 |
Report on first part of the security WP: Anti-Cloning Tag (D4. 3.1) M Aigner, T Plos, M Feldhofer, C Floerkemeier, Y Na, A Ruhanen, ... EU bridge project, available: www. bridge-project. eu/data/File …, 2008 | 6 | 2008 |
Time cost evaluation for executing RFID authentication protocols K Chiew, Y Li, T Li, RH Deng, M Aigner 2010 Internet of Things (IOT), 1-8, 2010 | 5 | 2010 |
Security in the Internet of Things M Aigner Radio Frequency Identification System Security, 109-124, 2010 | 5 | 2010 |
Security enhanced wisps: Implementation challenges A Szekely, M Höfler, R Stögbuchner, M Aigner Wirelessly Powered Sensor Networks and Computational RFID, 189-204, 2013 | 4 | 2013 |
Seven reasons for application of standardized crypto functionality on low cost tags M Aigner EU RFID Forum, 13-14, 2007 | 4 | 2007 |
Low-cost RFID tags as IPv6 nodes in the Internet of Things S Dominikus, H Gross, M Aigner, S Kraxberger Radio Frequency Identification System Security, 114-128, 2011 | 3 | 2011 |
A Universal and Efficient SHA-256 Implementation for FPGAs N Pramstaller, MJ Aigner Austrochip 2004, 89-93, 2004 | 3 | 2004 |