| BIKE: bit flipping key encapsulation N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... | 229 | 2022 |
| FIVER–Robust Verification of Countermeasures against Fault Injections J Richter-Brockmann, AR Shahmirzadi, P Sasdrich, A Moradi, T Güneysu | 67 | 2021 |
| Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices J Richter-Brockmann, J Mono, T Güneysu IEEE Transactions on Computers, 2020 | 66 | 2020 |
| Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice J Richter-Brockmann, P Sasdrich, T Güneysu | 55 | 2021 |
| Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware J Richter-Brockmann, MS Chen, S Ghosh, T Güneysu IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021 | 43 | 2021 |
| VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering J Richter-Brockmann, J Feldtkeller, P Sasdrich, T Güneysu Cryptology ePrint Archive, 2022 | 34 | 2022 |
| CINI MINIS: domain isolation for fault and combined security J Feldtkeller, J Richter-Brockmann, P Sasdrich, T Güneysu Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 24 | 2022 |
| Efficiently masking polynomial inversion at arbitrary order M Krausz, G Land, J Richter-Brockmann, T Güneysu International Conference on Post-Quantum Cryptography, 309-326, 2022 | 19 | 2022 |
| Deep Learning Multi-Channel Fusion Attack Against Side-Channel Protected Hardware B Hettwer, D Fennes, S Leger, J Richter-Brockmann, S Gehrer, ... | 17 | 2020 |
| A holistic approach towards side-channel secure fixed-weight polynomial sampling M Krausz, G Land, J Richter-Brockmann, T Güneysu IACR International Conference on Public-Key Cryptography, 94-124, 2023 | 16 | 2023 |
| Concurrent Error Detection Revisited: Hardware Protection against Fault and Side-Channel Attacks J Richter-Brockmann, P Sasdrich, F Bache, T Güneysu Proceedings of the 15th International Conference on Availability …, 2020 | 13 | 2020 |
| Combined private circuits-combined security refurbished J Feldtkeller, T Güneysu, T Moos, J Richter-Brockmann, S Saha, ... Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 12 | 2023 |
| Formal definition and verification for combined random fault and random probing security S Belaïd, J Feldtkeller, T Güneysu, A Guinet, J Richter-Brockmann, ... International Conference on the Theory and Application of Cryptology and …, 2024 | 9 | 2024 |
| Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures J Richter-Brockmann, T Güneysu 2020 IEEE 31th International Conference on Application-specific Systems …, 2020 | 6 | 2020 |
| BIKE: Bit flipping key encapsulation-spec v4. 2 N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... | 5 | 2021 |
| HADES: automated hardware design exploration for cryptographic primitives F Buschkowski, G Land, N Höher, J Richter-Brockmann, P Sasdrich, ... IACR Transactions on Cryptographic Hardware and Embedded Systems 2025 (4), 1-45, 2025 | 3 | 2025 |
| Combined Threshold Implementation J Feldtkeller, J Richter-Brockmann, P Sasdrich, T Güneysu IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (4 …, 2024 | 3 | 2024 |
| Gadget-based masking of streamlined NTRU Prime decapsulation in hardware G Land, A Marotzke, J Richter-Brockmann, T Güneysu IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (1), 1-26, 2024 | 3 | 2024 |
| Gate-level masking of streamlined ntru prime decapsulation in hardware G Land, A Marotzke, J Richter-Brockmann, T Güneysu Cryptology ePrint Archive, 2023 | 3 | 2023 |
| INDIANA-verifying (random) probing security through indistinguishability analysis C Beierle, J Feldtkeller, A Guinet, T Güneysu, G Leander, ... Annual International Conference on the Theory and Applications of …, 2025 | 2 | 2025 |