Folgen
Florian Unterstein
Florian Unterstein
Bestätigte E-Mail-Adresse bei infineon.com
Titel
Zitiert von
Zitiert von
Jahr
Your rails cannot hide from localized EM: How dual-rail logic fails on FPGAs
V Immler, R Specht, F Unterstein
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
292017
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks: A Practical Security Evaluation on FPGA
F Unterstein, J Heyszl, F De Santis, R Specht
International Workshop on Constructive Side-Channel Analysis and Secure …, 2017
282017
Dividing the threshold: Multi-probe localized EM analysis on threshold implementations
R Specht, V Immler, F Unterstein, J Heyszl, G Sig
2018 IEEE International Symposium on Hardware Oriented Security and Trust …, 2018
192018
Retrofitting leakage resilient authenticated encryption to microcontrollers
F Unterstein, M Schink, T Schamberger, L Tebelmann, M Ilg, J Heyszl
IACR Transactions on Cryptographic Hardware and Embedded Systems, 365-388, 2020
152020
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained: And an Improved Construction
F Unterstein, J Heyszl, F De Santis, R Specht, G Sigl
Cryptographers’ Track at the RSA Conference, 413-434, 2018
152018
Secure execution architecture based on puf-driven instruction level code encryption
S Kleber, F Unterstein, M Matousek, F Kargl, F Slomka, M Hiller
Cryptology ePrint Archive, 2015
142015
Investigating profiled side-channel attacks against the DES key schedule
J Heyszl, K Miller, F Unterstein, M Schink, A Wagner, H Gieser, S Freud, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 22-72, 2020
102020
Your rails cannot hide from localized em: how dual-rail logic fails on fpgas—extended version
V Immler, R Specht, F Unterstein
Journal of Cryptographic Engineering 8, 125-139, 2018
72018
Security and trust in open source security tokens
M Schink, A Wagner, F Unterstein, J Heyszl
IACR Transactions on Cryptographic Hardware and Embedded Systems, 176-201, 2021
62021
SCA secure and updatable crypto engines for FPGA soc bitstream decryption
F Unterstein, N Jacob, N Hanley, C Gu, J Heyszl
Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware …, 2019
62019
SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version
F Unterstein, N Jacob, N Hanley, C Gu, J Heyszl
Journal of Cryptographic Engineering 11, 257-272, 2021
42021
Design of the secure execution PUF-based processor (SEPP)
S Kleber, F Unterstein, M Matousek, F Kargl, F Slomka, M Hiller
TRUDEVICE Workshop on Secure Hardware and Security Evaluation, 2015
22015
Secure update of fpga-based secure elements using partial reconfiguration
F Unterstein, T Sel, T Zeschg, N Jacob, M Tempelmeier, M Pehl, ...
Cryptology ePrint Archive, 2020
12020
Secure code execution: A generic PUF-driven system architecture
S Kleber, F Unterstein, M Hiller, F Slomka, M Matousek, F Kargl, C Bösch
Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018
12018
ASCA vs. SASCA: A Closer Look at the AES Key Schedule
E Strieder, M Ilg, J Heyszl, F Unterstein, S Streit
International Workshop on Constructive Side-Channel Analysis and Secure …, 2023
2023
ASCA vs. SASCA
F Unterstein, S Streit
Constructive Side-Channel Analysis and Secure Design: 14th International …, 2023
2023
High precision electromagnetic analysis of leakage resilient cryptographic constructions
F Unterstein
Technische Universität München, 2021
2021
Your rails cannot hide from localized EM
V Immler, R Specht, F Unterstein
2018
Design of the Secure Execution PUF-based Processor (SEPP)
F Unterstein, S Kleber, M Matousek, F Kargl, F Slomka, M Hiller
Workshop on Trustworthy Manufacturing and Utilization of Secure Devices …, 2015
2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–19