Follow
Marcin Wójcik
Marcin Wójcik
Unknown affiliation
Verified email at cam.ac.uk
Title
Cited by
Cited by
Year
Re-architecting datacenter networks and stacks for low latency and high performance
M Handley, C Raiciu, A Agache, A Voinescu, AW Moore, G Antichi, ...
Proceedings of the Conference of the ACM Special Interest Group on Data …, 2017
2552017
Does my device leak information? an a priori statistical power analysis of leakage detection tests
L Mather, E Oswald, J Bandenburg, M Wójcik
International Conference on the Theory and Application of Cryptology and …, 2013
952013
Where has my time gone?
N Zilberman, M Grosvenor, DA Popescu, N Manihatty-Bojan, G Antichi, ...
International Conference on Passive and Active Network Measurement, 201-214, 2017
462017
Where Has My Time Gone?
N Zilberman, M Grosvenor, DA Popescu, N Manihatty-Bojan, G Antichi, ...
International Conference on Passive and Active Network Measurement, 201-214, 2017
462017
Emu: Rapid prototyping of networking services
N Sultana, S Galea, D Greaves, M Wójcik, J Shipton, R Clegg, L Mai, ...
2017 USENIX Annual Technical Conference (USENIX ATC 17), 459-471, 2017
402017
Emu: Rapid prototyping of networking services
N Sultana, S Galea, D Greaves, M Wójcik, J Shipton, R Clegg, L Mai, ...
2017 {USENIX} Annual Technical Conference ({USENIX}{ATC} 17), 459-471, 2017
402017
Security analysis of an open car immobilizer protocol stack
S Tillich, M Wójcik
International Conference on Trusted Systems, 83-94, 2012
322012
Evaluation of a PUF device authentication scheme on a discrete 0.13 um SRAM
P Koeberl, J Li, R Maes, A Rajan, C Vishik, M Wójcik
International Conference on Trusted Systems, 271-288, 2011
302011
A leakage resilient MAC
DP Martin, E Oswald, M Stam, M Wójcik
IMA International Conference on Cryptography and Coding, 295-310, 2015
252015
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software
JF Gallais, J Großschädl, N Hanley, M Kasper, M Medwed, F Regazzoni, ...
International Conference on Trusted Systems, 253-270, 2010
252010
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device
M Mössinger, B Petschkuhn, J Bauer, RC Staudemeyer, M Wójcik, ...
2016 IEEE 17th International Symposium on A World of Wireless, Mobile and …, 2016
232016
ICEPOLE: high-speed, hardware-oriented authenticated encryption
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 392-413, 2014
202014
The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication
RC Staudemeyer, HC Pöhls, M Wójcik
2018 IEEE 19th International Symposium on" A World of Wireless, Mobile and …, 2018
112018
ICEPOLE v1
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
Submission to CAESAR, 2014
112014
A practical device authentication scheme using SRAM PUFs
P Koeberl, J Li, R Maes, A Rajan, C Vishik, M Wójcik, W Wu
Journal of Cryptographic Engineering 2 (4), 255-269, 2012
92012
What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net
RC Staudemeyer, HC Pöhls, M Wójcik
Journal of Reliable Intelligent Environments 5 (1), 41-64, 2019
82019
An exploration of mechanisms for dynamic cryptographic instruction set extension
P Grabher, J Großschädl, S Hoerder, K Järvinen, D Page, S Tillich, ...
Journal of Cryptographic Engineering 2 (1), 1-18, 2012
72012
ICEPOLE v1. submission to CAESAR competition
P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ...
62015
Thor-the hardware onion router
T Güneysu, F Regazzoni, P Sasdrich, M Wójcik
2014 24th International Conference on Field Programmable Logic and …, 2014
52014
On the (re) design of an FPGA-based PUF.
P Grabher, D Page, M Wójcik
IACR Cryptol. ePrint Arch. 2013, 195, 2013
52013
The system can't perform the operation now. Try again later.
Articles 1–20