Follow
Marcin Wójcik
Marcin Wójcik
Unknown affiliation
Verified email at cam.ac.uk
Title
Cited by
Cited by
Year
Re-architecting datacenter networks and stacks for low latency and high performance
M Handley, C Raiciu, A Agache, A Voinescu, AW Moore, G Antichi, ...
Proceedings of the Conference of the ACM Special Interest Group on Data …, 2017
4162017
Does my device leak information? an a priori statistical power analysis of leakage detection tests
L Mather, E Oswald, J Bandenburg, M Wójcik
International Conference on the Theory and Application of Cryptology and …, 2013
1092013
Where has my time gone?
N Zilberman, M Grosvenor, DA Popescu, N Manihatty-Bojan, G Antichi, ...
International Conference on Passive and Active Network Measurement, 201-214, 2017
542017
Where Has My Time Gone?
N Zilberman, M Grosvenor, DA Popescu, N Manihatty-Bojan, G Antichi, ...
International Conference on Passive and Active Network Measurement, 201-214, 2017
542017
Emu: Rapid prototyping of networking services
N Sultana, S Galea, D Greaves, M Wójcik, J Shipton, R Clegg, L Mai, ...
2017 USENIX Annual Technical Conference (USENIX ATC 17), 459-471, 2017
432017
Emu: Rapid prototyping of networking services
N Sultana, S Galea, D Greaves, M Wójcik, J Shipton, R Clegg, L Mai, ...
2017 {USENIX} Annual Technical Conference ({USENIX}{ATC} 17), 459-471, 2017
432017
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device
M Mössinger, B Petschkuhn, J Bauer, RC Staudemeyer, M Wójcik, ...
2016 IEEE 17th International Symposium on A World of Wireless, Mobile and …, 2016
352016
Security analysis of an open car immobilizer protocol stack
S Tillich, M Wójcik
International Conference on Trusted Systems, 83-94, 2012
352012
Evaluation of a PUF device authentication scheme on a discrete 0.13 um SRAM
P Koeberl, J Li, R Maes, A Rajan, C Vishik, M Wójcik
International Conference on Trusted Systems, 271-288, 2011
342011
A leakage resilient MAC
DP Martin, E Oswald, M Stam, M Wójcik
IMA International Conference on Cryptography and Coding, 295-310, 2015
292015
ICEPOLE: high-speed, hardware-oriented authenticated encryption
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 392-413, 2014
262014
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software
JF Gallais, J Großschädl, N Hanley, M Kasper, M Medwed, F Regazzoni, ...
International Conference on Trusted Systems, 253-270, 2010
262010
The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication
RC Staudemeyer, HC Pöhls, M Wójcik
2018 IEEE 19th International Symposium on" A World of Wireless, Mobile and …, 2018
142018
ICEPOLE v1
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
Submission to CAESAR, 2014
142014
What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net
RC Staudemeyer, HC Pöhls, M Wójcik
Journal of Reliable Intelligent Environments 5 (1), 41-64, 2019
132019
A practical device authentication scheme using SRAM PUFs
P Koeberl, J Li, R Maes, A Rajan, C Vishik, M Wójcik, W Wu
Journal of Cryptographic Engineering 2 (4), 255-269, 2012
92012
An exploration of mechanisms for dynamic cryptographic instruction set extension
P Grabher, J Großschädl, S Hoerder, K Järvinen, D Page, S Tillich, ...
Journal of Cryptographic Engineering 2 (1), 1-18, 2012
72012
ICEPOLE v1. submission to CAESAR competition
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
62015
On reconfigurable fabrics and generic side-channel countermeasures
R Beat, P Grabher, D Page, S Tillich, M Wójcik
22nd International Conference on Field Programmable Logic and Applications …, 2012
62012
An evaluation of hash functions on a power analysis resistant processor architecture
S Hoerder, M Wójcik, S Tillich, D Page
IFIP International Workshop on Information Security Theory and Practices …, 2011
62011
The system can't perform the operation now. Try again later.
Articles 1–20