E-Mail: rp@rpls.de
ORCID: 0000-0003-0972-1544
I write code and design hardware for cryptographic schemes on embedded systems. My interest cover high-speed and lightweight implementations for ARM Cortex-M and RISC-V platforms, side-channel attacks, hardware implementations, and software-hardware codesigns.
Currently, I am a researcher at the Max Planck Institute for Security and Privacy.
Previously, I was a researcher at the Fraunhofer Institute for Secure Information Technology
Michael Kreutzer, Norman Lahr, and Richard Petri. “Post-Quanten-Verschlüsselung. Einblicke”. In: iX Special 2021 (June 10, 2021). URL: https://www.heise.de/select/ix/2021/13/2106818322050385125.
Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, and Richard Petri. “ISA Extensions for Finite Field Arithmetic Accelerating Kyber and NewHope on RISC-V”. in: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020.3 (2020), pp. 219–242. DOI: 10.13154/tches.v2020.i3.219-242.
Hülya Evkan, Norman Lahr, Ruben Niederhagen, Richard Petri, Andreas Poller, Philipp Roskosch, and Michael Tröger. Security Evaluation of VeraCrypt. Tech. rep. Federal Office for Information Security (BSI), 2020. URL: https://www.bsi.bund.de/dok/15138010.
Lukas Jäger and Richard Petri. “DICE harder: a hardware implementation of the device identifier composition engine”. In: ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020. Ed. by Melanie Volkamer and Christian Wressnegger. ACM, 2020, 54:1–54:8. DOI: 10.1145/3407023.3407028.
Norman Lahr, Ruben Niederhagen, Richard Petri, and Simona Samardjiska. “Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the ”Classic McEliece” Hardware Reference Implementation”. In: Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I. ed. by Shiho Moriai and Huaxiong Wang. Vol. 12491. Lecture Notes in Computer Science. Springer, 2020, pp. 881–910. DOI: 10.1007/978-3-030-64837-4_29.
Bernhard Jungk, Richard Petri, and Marc Stöttinger. “Efficient Side-Channel Protections of ARX Ciphers”. In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018.3 (2018), pp. 627–653. DOI: 10.13154/tches.v2018.i3.627-653.
Lukas Jäger, Richard Petri, and Andreas Fuchs. “Rolling DICE: Lightweight Re- mote Attestation for COTS IoT Hardware”. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017. ACM, 2017, 95:1–95:8. DOI: 10.1145/3098954.3103165.
Dirk Feldhusen, Max Gebhardt, Georg Illies, Michael Kasper, Manfred Lochter, Richard Petri, Oliver Stein, Wolfgang Thumser, and Guntram Wicke. Minimum Requirements for Evaluating Side-Channel Attack Resistance of Elliptic Curve Implementations (AIS 46). Techical report. Federal Office for Information Security (BSI), Nov. 21, 2016. URL: https://www.bsi.bund.de/dok/10217840.