Your rails cannot hide from localized EM: How dual-rail logic fails on FPGAs V Immler, R Specht, F Unterstein Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 29 | 2017 |
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks: A Practical Security Evaluation on FPGA F Unterstein, J Heyszl, F De Santis, R Specht International Workshop on Constructive Side-Channel Analysis and Secure …, 2017 | 28 | 2017 |
Dividing the threshold: Multi-probe localized EM analysis on threshold implementations R Specht, V Immler, F Unterstein, J Heyszl, G Sig 2018 IEEE International Symposium on Hardware Oriented Security and Trust …, 2018 | 19 | 2018 |
Retrofitting leakage resilient authenticated encryption to microcontrollers F Unterstein, M Schink, T Schamberger, L Tebelmann, M Ilg, J Heyszl IACR Transactions on Cryptographic Hardware and Embedded Systems, 365-388, 2020 | 15 | 2020 |
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained: And an Improved Construction F Unterstein, J Heyszl, F De Santis, R Specht, G Sigl Cryptographers’ Track at the RSA Conference, 413-434, 2018 | 15 | 2018 |
Secure execution architecture based on puf-driven instruction level code encryption S Kleber, F Unterstein, M Matousek, F Kargl, F Slomka, M Hiller Cryptology ePrint Archive, 2015 | 14 | 2015 |
Investigating profiled side-channel attacks against the DES key schedule J Heyszl, K Miller, F Unterstein, M Schink, A Wagner, H Gieser, S Freud, ... IACR Transactions on Cryptographic Hardware and Embedded Systems, 22-72, 2020 | 10 | 2020 |
Security and trust in open source security tokens M Schink, A Wagner, F Unterstein, J Heyszl IACR Transactions on Cryptographic Hardware and Embedded Systems, 176-201, 2021 | 7 | 2021 |
Your rails cannot hide from localized em: how dual-rail logic fails on fpgas—extended version V Immler, R Specht, F Unterstein Journal of Cryptographic Engineering 8, 125-139, 2018 | 7 | 2018 |
SCA secure and updatable crypto engines for FPGA soc bitstream decryption F Unterstein, N Jacob, N Hanley, C Gu, J Heyszl Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware …, 2019 | 6 | 2019 |
SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version F Unterstein, N Jacob, N Hanley, C Gu, J Heyszl Journal of Cryptographic Engineering 11, 257-272, 2021 | 4 | 2021 |
Design of the secure execution PUF-based processor (SEPP) S Kleber, F Unterstein, M Matousek, F Kargl, F Slomka, M Hiller TRUDEVICE Workshop on Secure Hardware and Security Evaluation, 2015 | 2 | 2015 |
Secure update of fpga-based secure elements using partial reconfiguration F Unterstein, T Sel, T Zeschg, N Jacob, M Tempelmeier, M Pehl, ... Cryptology ePrint Archive, 2020 | 1 | 2020 |
Secure code execution: A generic PUF-driven system architecture S Kleber, F Unterstein, M Hiller, F Slomka, M Matousek, F Kargl, C Bösch Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018 | 1 | 2018 |
ASCA vs. SASCA: A Closer Look at the AES Key Schedule E Strieder, M Ilg, J Heyszl, F Unterstein, S Streit International Workshop on Constructive Side-Channel Analysis and Secure …, 2023 | | 2023 |
ASCA vs. SASCA F Unterstein, S Streit Constructive Side-Channel Analysis and Secure Design: 14th International …, 2023 | | 2023 |
High precision electromagnetic analysis of leakage resilient cryptographic constructions F Unterstein Technische Universität München, 2021 | | 2021 |
Your rails cannot hide from localized EM V Immler, R Specht, F Unterstein | | 2018 |
Design of the Secure Execution PUF-based Processor (SEPP) F Unterstein, S Kleber, M Matousek, F Kargl, F Slomka, M Hiller Workshop on Trustworthy Manufacturing and Utilization of Secure Devices …, 2015 | | 2015 |