| A highly regular and scalable AES hardware architecture S Mangard, M Aigner, S Dominikus IEEE Transactions on Computers 52 (4), 483-491, 2003 | 305 | 2003 |
| Randomized addition-subtraction chains as a countermeasure against power attacks E Oswald, M Aigner International Workshop on Cryptographic Hardware and Embedded Systems, 39-50, 2001 | 190 | 2001 |
| Power analysis tutorial M Aigner, E Oswald | 95 | 2000 |
| mCoupons: An application for near field communication (NFC) S Dominikus, M Aigner 21st international conference on advanced information networking and …, 2007 | 92 | 2007 |
| Secure symmetric authentication for RFID tags MJ Aigner, M Feldhofer TCMC2005, 1-4, 2005 | 82 | 2005 |
| A system of secure virtual coupons using NFC technology M Aigner, S Dominikus, M Feldhofer Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007 | 67 | 2007 |
| Passive RFID technology for the Internet of Things S Dominikus, M Aigner, S Kraxberger 2010 International Conference for Internet Technology and Secured …, 2010 | 47 | 2010 |
| Side channel analysis resistant design flow M Aigner, S Mangard, F Menichelli, R Menicocci, M Olivieri, T Popp, ... 2006 IEEE International Symposium on Circuits and Systems, 4 pp.-2912, 2006 | 39 | 2006 |
| Semi-passive RFID development platform for implementing and attacking security tags M Feldhofer, M Aigner, T Baier, M Hutter, T Plos, E Wenger 2010 International Conference for Internet Technology and Secured …, 2010 | 32 | 2010 |
| A novel CMOS logic style with data independent power consumption M Aigner, S Mangard, R Menicocci, M Olivieri, G Scotti, A Trifiletti 2005 IEEE International Symposium on Circuits and Systems, 1066-1069, 2005 | 30 | 2005 |
| An application of RFID tags using secure symmetric authentication M Feldhofer, MJ Aigner, S Dominikus Proceedings of IEEE Security, Privacy and Trust in Pervasive and Ubiquitous …, 2005 | 25 | 2005 |
| Semi-passive RFID development platform for implementing and attacking security tags T Plos, M Aigner, T Baier, M Feldhofer, M Hutter, T Korak, E Wenger International Journal of RFID Security and Cryptography 1 (1), 16-24, 2012 | 13 | 2012 |
| Secure semi-passive RFID tags—prototype and analysis M Aigner, T Plos, ARS Coluccini Building Radio frequency IDentification for the Global Environment (BRIDGE …, 2008 | 9 | 2008 |
| Time cost evaluation for executing RFID authentication protocols K Chiew, Y Li, T Li, RH Deng, M Aigner 2010 Internet of Things (IOT), 1-8, 2010 | 6 | 2010 |
| Report on first part of the security WP: Anti-Cloning Tag (D4. 3.1) M Aigner, T Plos, M Feldhofer, C Floerkemeier, Y Na, A Ruhanen, ... EU bridge project, available: www. bridge-project. eu/data/File …, 2008 | 6 | 2008 |
| Security in the Internet of Things M Aigner Radio Frequency Identification System Security, 109-124, 2010 | 5 | 2010 |
| Security enhanced wisps: Implementation challenges A Szekely, M Höfler, R Stögbuchner, M Aigner Wirelessly Powered Sensor Networks and Computational RFID, 189-204, 2013 | 4 | 2013 |
| Seven reasons for application of standardized crypto functionality on low cost tags M Aigner EU RFID Forum, 13-14, 2007 | 4 | 2007 |
| Low-cost RFID tags as IPv6 nodes in the Internet of Things S Dominikus, H Gross, M Aigner, S Kraxberger Radio Frequency Identification System Security, 114-128, 2011 | 3 | 2011 |
| A Universal and Efficient SHA-256 Implementation for FPGAs N Pramstaller, MJ Aigner Austrochip 2004, 89-93, 2004 | 3 | 2004 |