Author of the publication

Your Rails Cannot Hide from Localized EM: How Dual-Rail Logic Fails on FPGAs.

, , and . CHES, volume 10529 of Lecture Notes in Computer Science, page 403-424. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Update of FPGA-based Secure Elements using Partial Reconfiguration., , , , , , and . IACR Cryptol. ePrint Arch., (2020)Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers., , , , , and . IACR Cryptol. ePrint Arch., (2020)Your rails cannot hide from localized EM: how dual-rail logic fails on FPGAs - extended version., , and . J. Cryptographic Engineering, 8 (2): 125-139 (2018)Your Rails Cannot Hide from Localized EM: How Dual-Rail Logic Fails on FPGAs., , and . CHES, volume 10529 of Lecture Notes in Computer Science, page 403-424. Springer, (2017)Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA., , , and . COSADE, volume 10348 of Lecture Notes in Computer Science, page 34-49. Springer, (2017)High precision electromagnetic analysis of leakage resilient cryptographic constructions.. Technical University of Munich, Germany, (2021)ASCA vs. SASCA - A Closer Look at the AES Key Schedule., , , , and . COSADE, volume 13979 of Lecture Notes in Computer Science, page 65-85. Springer, (2023)Security and Trust in Open Source Security Tokens., , , and . IACR Cryptol. ePrint Arch., (2021)Investigating Profiled Side-Channel Attacks Against the DES Key Schedule., , , , , , , , , and . IACR Cryptol. ePrint Arch., (2019)Investigating Profiled Side-Channel Attacks Against the DES Key Schedule., , , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (3): 22-72 (2020)