Marcin Wójcik
Marcin Wójcik
Unknown affiliation
Verified email at cs.bris.ac.uk
Title
Cited by
Cited by
Year
Re-architecting datacenter networks and stacks for low latency and high performance
M Handley, C Raiciu, A Agache, A Voinescu, AW Moore, G Antichi, ...
Proceedings of the Conference of the ACM Special Interest Group on Data …, 2017
1012017
Does my device leak information? an a priori statistical power analysis of leakage detection tests
L Mather, E Oswald, J Bandenburg, M Wójcik
International Conference on the Theory and Application of Cryptology and …, 2013
652013
Security analysis of an open car immobilizer protocol stack
S Tillich, M Wójcik
International Conference on Trusted Systems, 83-94, 2012
282012
Emu: Rapid prototyping of networking services
N Sultana, S Galea, D Greaves, M Wójcik, J Shipton, R Clegg, L Mai, ...
2017 USENIX Annual Technical Conference (USENIX ATC 17), 459-471, 2017
272017
Where has my time gone?
N Zilberman, M Grosvenor, DA Popescu, N Manihatty-Bojan, G Antichi, ...
International Conference on Passive and Active Network Measurement, 201-214, 2017
272017
Where Has My Time Gone?
N Zilberman, M Grosvenor, DA Popescu, N Manihatty-Bojan, G Antichi, ...
International Conference on Passive and Active Network Measurement, 201-214, 2017
272017
Evaluation of a PUF device authentication scheme on a discrete 0.13 um SRAM
P Koeberl, J Li, R Maes, A Rajan, C Vishik, M Wójcik
International Conference on Trusted Systems, 271-288, 2011
262011
A leakage resilient MAC
DP Martin, E Oswald, M Stam, M Wójcik
IMA International Conference on Cryptography and Coding, 295-310, 2015
232015
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software
JF Gallais, J Großschädl, N Hanley, M Kasper, M Medwed, F Regazzoni, ...
International Conference on Trusted Systems, 253-270, 2010
182010
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device
M Mössinger, B Petschkuhn, J Bauer, RC Staudemeyer, M Wójcik, ...
2016 IEEE 17th International Symposium on A World of Wireless, Mobile and …, 2016
172016
ICEPOLE: high-speed, hardware-oriented authenticated encryption
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 392-413, 2014
172014
ICEPOLE v1
P l Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
92014
ICEPOLE v1
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
Submission to CAESAR, 2014
82014
ICEPOLE v1. submission to CAESAR competition
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
72015
A practical device authentication scheme using SRAM PUFs
P Koeberl, J Li, R Maes, A Rajan, C Vishik, M Wójcik, W Wu
Journal of Cryptographic Engineering 2 (4), 255-269, 2012
72012
On reconfigurable fabrics and generic side-channel countermeasures
R Beat, P Grabher, D Page, S Tillich, M Wójcik
22nd International Conference on Field Programmable Logic and Applications …, 2012
52012
On the (re) design of an FPGA-based PUF.
P Grabher, D Page, M Wójcik
IACR Cryptology ePrint Archive 2013, 195, 2013
42013
The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication
RC Staudemeyer, HC Pöhls, M Wójcik
2018 IEEE 19th International Symposium on" A World of Wireless, Mobile and …, 2018
32018
A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices
L Mather, E Oswald, J Bandenburg, M Wójcik
Cryptology ePrint Archive, Report 2013/298, 2013
32013
An exploration of mechanisms for dynamic cryptographic instruction set extension
P Grabher, J Großschädl, S Hoerder, K Järvinen, D Page, S Tillich, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 1-16, 2011
32011
The system can't perform the operation now. Try again later.
Articles 1–20