E-Mail: rp (at) rpls.de
ORCID: 0000-0003-0972-1544
I write code and design hardware for cryptographic schemes on embedded systems. My interest cover high-speed and lightweight implementations for ARM Cortex-M and RISC-V platforms, side-channel attacks, hardware implementations, and software-hardware codesigns.
Currently, I am a researcher at the Max Planck Institute for Security and Privacy.
Previously, I was a researcher at the Fraunhofer Institute for Secure Information Technology
Julius Hermelink, Kai-Chun Ning, Richard Petri. “Finding and Protecting the Weakest Link: On Side-Channel Attacks on Masked ML-DSA”. EPRINT: 2025/276.
Julius Hermelink, Silvan Streit, Erik Mårtensson, Richard Petri. “A Generic Framework for Side-Channel Attacks against LWE-based Cryptosystems”. Accepted at Eurocrypt 2025. EPRINT: 2024/1211.
Julius Hermelink, Kai-Chun Ning, Richard Petri, and Emanuele Strieder. “The Insecurity of Masked Comparisons: SCAs on ML-KEM’s FO-Transform”. In: ACM CCS 2024. DOI: 10.1145/3658644.3690339.
Matthias Kannwischer, Markus Krausz, Richard Petri, Shang-Yi Yang. “pqm4: Benchmarking NIST Additional Post-Quantum Signature Schemes on Microcontrollers”. In: Fifth NIST PQC Standardization Conference (April 10-12, 2024). EPRINT: 2024/112.
Michael Kreutzer, Norman Lahr, and Richard Petri. “Post-Quanten-Verschlüsselung. Einblicke”. In: iX Special 2021 (June 10, 2021). URL: https://www.heise.de/select/ix/2021/13/2106818322050385125.
Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, and Richard Petri. “ISA Extensions for Finite Field Arithmetic”. In: IACR TCHES 2020.3. DOI: 10.13154/tches.v2020.i3.219-242.
Hülya Evkan, Norman Lahr, Ruben Niederhagen, Richard Petri, Andreas Poller, Philipp Roskosch, and Michael Tröger. “Security Evaluation of VeraCrypt”. Technical report for the German Federal Office for Information Security (BSI), 2020. URL: https://www.bsi.bund.de/dok/15138010.
Lukas Jäger and Richard Petri. “DICE harder: a hardware implementation of the device identifier composition engine”. In: ARES 2020. DOI: 10.1145/3407023.3407028.
Norman Lahr, Ruben Niederhagen, Richard Petri, and Simona Samardjiska. “Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the “Classic McEliece” Hardware Reference Implementation”. In: ASIACRYPT 2020. DOI: 10.1007/978-3-030-64837-4_29.
Bernhard Jungk, Richard Petri, and Marc Stöttinger. “Efficient Side-Channel Protections of ARX Ciphers”. In: IACR TCHES 2018.3. DOI: 10.13154/tches.v2018.i3.627-653.
Lukas Jäger, Richard Petri, and Andreas Fuchs. “Rolling DICE: Lightweight Remote Attestation for COTS IoT Hardware”. In: ARES 2017. DOI: 10.1145/3098954.3103165.
Richard Petri, Markus Springer, Daniel Zelle, Ira McDonald, Andreas Fuchs, Christoph Krauß. “Evaluation of Lightweight TPMs for Automotive Software Updates over the Air”. In: ESCAR USA 2016 DOI: 10.24406/publica-fhg-394900
Dirk Feldhusen, Max Gebhardt, Georg Illies, Michael Kasper, Manfred Lochter, Richard Petri, Oliver Stein, Wolfgang Thumser, and Guntram Wicke. “Minimum Requirements for Evaluating Side-Channel Attack Resistance of Elliptic Curve Implementations (AIS 46)”. Technical report for the German Federal Office for Information Security (BSI), Nov. 21, 2016. URL: https://www.bsi.bund.de/dok/10217840.