H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 33 Citations 6,024 143 World Ranking 6914 National Ranking 330

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Cryptography
  • Algorithm

Embedded system, Cryptography, Encryption, Field-programmable gate array and Reconfigurable computing are his primary areas of study. His studies deal with areas such as Computer hardware, Source code, Discrete logarithm, Direct Anonymous Attestation and Implementation as well as Embedded system. Cryptography is closely attributed to Public-key cryptography in his study.

In his study, Overhead, Logic synthesis and Latency is inextricably linked to Key, which falls within the broad field of Encryption. His Field-programmable gate array research is multidisciplinary, incorporating perspectives in Round function, Block, Scrambling and Reference implementation. His biological study deals with issues like Algorithm, which deal with fields such as Hash function.

His most cited work include:

  • PRINCE: a low-latency block cipher for pervasive computing applications (374 citations)
  • Practical lattice-based cryptography: a signature scheme for embedded systems (177 citations)
  • PRINCE – A Low-latency Block Cipher for Pervasive Computing Applications (170 citations)

What are the main themes of his work throughout his whole career to date?

Tim Güneysu mostly deals with Cryptography, Embedded system, Field-programmable gate array, Encryption and Side channel attack. His study in the field of Cryptosystem is also linked to topics like Lattice-based cryptography. In Embedded system, Tim Güneysu works on issues like Cipher, which are connected to Block cipher.

Tim Güneysu works mostly in the field of Field-programmable gate array, limiting it down to concerns involving Parallel computing and, occasionally, Computation. His Encryption research integrates issues from Theoretical computer science and Computer engineering. His research in Side channel attack intersects with topics in Computer hardware and Artificial intelligence.

He most often published in these fields:

  • Cryptography (42.16%)
  • Embedded system (41.08%)
  • Field-programmable gate array (26.49%)

What were the highlights of his more recent work (between 2017-2021)?

  • Side channel attack (18.38%)
  • Embedded system (41.08%)
  • Cryptography (42.16%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Side channel attack, Embedded system, Cryptography, Encryption and Computer security. The study incorporates disciplines such as Computer hardware, Power analysis, Security level, Artificial intelligence and Fault injection in addition to Side channel attack. In the subject of general Embedded system, his work in Field-programmable gate array and Microcontroller is often linked to Control reconfiguration and NIST, thereby combining diverse domains of study.

Tim Güneysu interconnects Routing and Complex programmable logic device in the investigation of issues within Field-programmable gate array. The concepts of his Cryptography study are interwoven with issues in Lattice, Post-quantum cryptography, Public-key cryptography and Key encapsulation. His Encryption research incorporates themes from Adversary and Adversary model.

Between 2017 and 2021, his most popular works were:

  • Practical CCA2-Secure and Masked Ring-LWE Implementation (25 citations)
  • Applications of machine learning techniques in side-channel attacks: a survey (18 citations)
  • Standard Lattice-Based Key Encapsulation on Embedded Devices (18 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Cryptography
  • Algorithm

His primary areas of investigation include Cryptography, Artificial intelligence, Side channel attack, Computer security and Encryption. Tim Güneysu focuses mostly in the field of Cryptography, narrowing it down to topics relating to Key exchange and, in certain cases, Hardware security module. His study in Computer security is interdisciplinary in nature, drawing from both Electronic design automation and Integrated circuit.

He usually deals with Encryption and limits it to topics linked to Adversary and Implementation, Key recovery, Cryptosystem and Software deployment. His work in Learning with errors tackles topics such as Post-quantum cryptography which are related to areas like Embedded system. Embedded system connects with themes related to Parallel computing in his study.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

PRINCE – A Low-latency Block Cipher for Pervasive Computing Applications

Julia Borghoff;Anne Canteaut;Tim Güneysu;Elif Bilge Kavun.
(2012)

741 Citations

PRINCE: a low-latency block cipher for pervasive computing applications

Julia Borghoff;Anne Canteaut;Tim Güneysu;Elif Bilge Kavun.
international conference on the theory and application of cryptology and information security (2012)

575 Citations

Practical lattice-based cryptography: a signature scheme for embedded systems

Tim Güneysu;Vadim Lyubashevsky;Thomas Pöppelmann.
cryptographic hardware and embedded systems (2012)

280 Citations

Exploiting the Power of GPUs for Asymmetric Cryptography

Robert Szerwinski;Tim Güneysu.
cryptographic hardware and embedded systems (2008)

225 Citations

Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering

Lang Lin;Markus Kasper;Tim Güneysu;Christof Paar.
cryptographic hardware and embedded systems (2009)

218 Citations

Cryptanalysis with COPACOBANA

T. Guneysu;T. Kasper;M. Novotny;C. Paar.
IEEE Transactions on Computers (2008)

209 Citations

Ultra High Performance ECC over NIST Primes on Commercial FPGAs

Tim Güneysu;Christof Paar.
cryptographic hardware and embedded systems (2008)

167 Citations

Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware

Thomas Pöppelmann;Tim Güneysu.
selected areas in cryptography (2013)

159 Citations

Enhanced Lattice-Based Signatures on Reconfigurable Hardware

Thomas Pöppelmann;Léo Ducas;Tim Güneysu.
cryptographic hardware and embedded systems (2014)

142 Citations

Towards efficient arithmetic for lattice-based cryptography on reconfigurable hardware

Thomas Pöppelmann;Tim Güneysu.
international conference on progress in cryptology (2012)

139 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Tim Güneysu

Ingrid Verbauwhede

Ingrid Verbauwhede

KU Leuven

Publications: 43

Christof Paar

Christof Paar

Max Planck Society

Publications: 35

Debdeep Mukhopadhyay

Debdeep Mukhopadhyay

Indian Institute of Technology Kharagpur

Publications: 33

Peter Schwabe

Peter Schwabe

Radboud University Nijmegen

Publications: 25

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 25

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 21

Daniel J. Bernstein

Daniel J. Bernstein

University of Illinois at Chicago

Publications: 21

Johannes Buchmann

Johannes Buchmann

TU Darmstadt

Publications: 20

Patrick Schaumont

Patrick Schaumont

Worcester Polytechnic Institute

Publications: 20

Frederik Vercauteren

Frederik Vercauteren

KU Leuven

Publications: 19

Tanja Lange

Tanja Lange

Eindhoven University of Technology

Publications: 19

Lejla Batina

Lejla Batina

Radboud University Nijmegen

Publications: 17

Gregor Leander

Gregor Leander

Ruhr University Bochum

Publications: 17

Vincent Rijmen

Vincent Rijmen

KU Leuven

Publications: 12

Willi Meier

Willi Meier

University of Applied Sciences and Arts Northwestern Switzerland

Publications: 12

Something went wrong. Please try again later.