Thomas Unterluggauer

According to our database1, Thomas Unterluggauer authored at least 28 papers between 2013 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
MEAS: memory encryption and authentication secure against side-channel attacks.
J. Cryptographic Engineering, 2019

ScatterCache: Thwarting Cache Attacks via Cache Set Randomization.
Proceedings of the 28th USENIX Security Symposium, 2019

Protecting RISC-V Processors against Physical Attacks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

2018
Sponge-Based Control-Flow Protection for IoT Devices.
CoRR, 2018

Sponge-Based Control-Flow Protection for IoT Devices.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

High speed ASIC implementations of leakage-resilient cryptography.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

2017
ISAP - Towards Side-Channel Secure Authenticated Encryption.
IACR Trans. Symmetric Cryptol., 2017

Transparent Memory Encryption and Authentication.
IACR Cryptology ePrint Archive, 2017

Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives.
IACR Cryptology ePrint Archive, 2017

Leakage Bounds for Gaussian Side Channels.
IACR Cryptology ePrint Archive, 2017

Transparent memory encryption and authentication.
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017

Side-channel plaintext-recovery attacks on leakage-resilient encryption.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Leakage Bounds for Gaussian Side Channels.
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption.
IACR Cryptology ePrint Archive, 2016

Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption.
IACR Cryptology ePrint Archive, 2016

Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks.
IACR Cryptology ePrint Archive, 2016

Concealing Secrets in Embedded Processors Designs.
IACR Cryptology ePrint Archive, 2016

ISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks.
IACR Cryptology ePrint Archive, 2016

Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2016

Concealing Secrets in Embedded Processors Designs.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2014
Efficient Pairings and ECC for Embedded Systems.
IACR Cryptology ePrint Archive, 2014

Adding Controllable Linkability to Pairing-Based Group Signatures For Free.
IACR Cryptology ePrint Archive, 2014

Adding Controllable Linkability to Pairing-Based Group Signatures for Free.
Proceedings of the Information Security - 17th International Conference, 2014

Efficient Pairings and ECC for Embedded Systems.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices.
Proceedings of the Ninth International Conference on Availability, 2014

2013
8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013


  Loading...