“Hardware
Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic
Software”,
Jean-Francois Gallais, Johann
Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni, Jörn-Marc
Schmidt, Stefan Tillich and Marcin Wojcik, International Conference on Trusted
Systems - INTRUST 2010, Springer-Verlag
“FPGA
Implementations of the Round Two SHA-3 Candidates”
,
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilton, Neil Hanley, Maire
O'Neill and William P. Marnane, Field Programmable Logic and Applications - FPL
2010, IET
”FPGA
Implementations of the Round Two SHA-3 Candidates”,
Brian Baldwin, Neil Hanley, Mark Hamilton, Andrew Byrne, Liang Lu, Maire
O'Neill and William P. Marnane, The Second SHA-3 Candidate Conference, NIST
“A
Hardware Wrapper for the SHA-3 Hash Algorithms”
,
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilton, Neil Hanley, Maire
O'Neill and William P. Marnane, Irish Signals and Systems Conference – ISSC
2010, IET
“Unknown
Plaintext Template Attacks”,
Neil Hanley, Michael
Tunstall and William P. Marnane, Information Security Applications – WISA 2009,
Springer-Verlag
“FPGA
Implementations of SHA-3 Candidates: CubeHash, Grostl, LANE, Shabal and
Spectral Hash"
, Brian Baldwin, Andrew Byrne,
Mark Hamilton, Neil Hanley, Robert P. McEvoy, Weibo Pan and William P. Marnane,
Digital System Design, Architectures, Methods and Tools - DSD 2009, IEEE
“Correlation
Power Analysis of Large Word Sizes”
, Michael
Tunstall, Neil Hanley, Robert P. McEvoy, Claire Whelan, Colin C. Murphy and William
P. Marnane, Irish Signals and Systems Conference - ISSC 2007, IET
“Attacking
Smart Cards: Side Channel and Fault Analysis”,
Philipp Grabher, Neil Hanley and Michael Tunstall, Computer Science Research
and Technology (Book Chapter), Nova Publishing