Security and Trust in Open Source Security Tokens
Schink, Marc, Wagner, Alexander, Unterstein, Florian, Heyszl, Johann
Published in IACR transactions on cryptographic hardware and embedded systems (09.07.2021)
Published in IACR transactions on cryptographic hardware and embedded systems (09.07.2021)
Get full text
Journal Article
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule
Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler
Published in IACR transactions on cryptographic hardware and embedded systems (01.06.2020)
Published in IACR transactions on cryptographic hardware and embedded systems (01.06.2020)
Get full text
Journal Article
Your rails cannot hide from localized EM: how dual-rail logic fails on FPGAs—extended version
Immler, Vincent, Specht, Robert, Unterstein, Florian
Published in Journal of cryptographic engineering (01.06.2018)
Published in Journal of cryptographic engineering (01.06.2018)
Get full text
Journal Article
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule
Heyszl, Johann, Miller, Katja, Unterstein, Florian, Schink, Marc, Wagner, Alexander, Gieser, Horst, Freud, Sven, Damm, Tobias, Klein, Dominik, Kügler, Dennis
Published in IACR transactions on cryptographic hardware and embedded systems (19.06.2020)
Published in IACR transactions on cryptographic hardware and embedded systems (19.06.2020)
Get full text
Journal Article
ASSISTING SWIMMING SUITS
NICO KEINATH, LEE, SOO YOUNG, CHO, MIN KYU, FLORIAN UNTERSTEIN, PARK, WOO JIN, JANG, JI EUN
Year of Publication 07.08.2014
Get full text
Year of Publication 07.08.2014
Patent
Dividing the threshold: Multi-probe localized EM analysis on threshold implementations
Specht, Robert, Immler, Vincent, Unterstein, Florian, Heyszl, Johann, Sig, Georg
Published in 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (01.04.2018)
Published in 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (01.04.2018)
Get full text
Conference Proceeding