Open-Source Code

Below you can find open-source code from our group. If you use the code, please kindly cite the related publication and let us know.

FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes

Wen Wang, Jakub Szefer, and Ruben Niederhagen, FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes" in Proceedings of the Conference on Cryptographic Hardware and Embedded Systems (CHES), September 2017.
[ PDF ] [ BibTeX ] [ CODE ]

Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security

André Schaller, Wenjie Xiong, Muhammad Umair Salee, Nikolaos A. Anagnostopoulos, Stefan Katzenbeisser, and Jakub Szefer, "Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security" in Proceedings of the International Symposium on Hardware Oriented Security and Trust (HOST), May 2017.
[ PDF ] [ BibTeX ] [ CODE ]

Solving Large Systems of Linear Equations over GF(2) on FPGAs

Wen Wang, Jakub Szefer, and Ruben Niederhagen, "Solving Large Systems of Linear Equations over GF(2) on FPGAs" in Proceedings of the International Conference on Reconfigurable Computing and FPGAs (ReConFig), November 2016.
[ PDF ] [ BibTeX ] [ CODE ]

Run-time Accessible DRAM PUFs in Commodity Devices

Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, and Jakub Szefer, "Run-time Accessible DRAM PUFs in Commodity Devices" in Proceedings of the Conference on Cryptographic Hardware and Embedded Systems (CHES), August 2016.
[ PDF ] [ BibTeX ] [ CODE ]

SystemWall: An Isolated Firewall using Hardware-based Memory Introspection

Sebastian Biedermann and Jakub Szefer, "SystemWall: An Isolated Firewall using Hardware-based Memory Introspection" in Proceedings of the International Security Conference (ISC), October 2014.
[ PDF ] [ BibTeX ] [ CODE ]