Follow
Nils Wisiol
Nils Wisiol
AMD
Verified email at nils-wisiol.de - Homepage
Title
Cited by
Cited by
Year
Splitting the interpose PUF: A novel modeling attack strategy
N Wisiol, C Mühl, N Pirnay, PH Nguyen, M Margraf, JP Seifert, M Van Dijk, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 97-120, 2020
972020
Breaking the lightweight secure PUF: Understanding the relation of input transformations and machine learning resistance
N Wisiol, GT Becker, M Margraf, TAA Soroceanu, J Tobisch, B Zengin
Smart Card Research and Advanced Applications: 18th International Conference …, 2020
362020
Neural network modeling attacks on arbiter-PUF-based designs
N Wisiol, B Thapaliya, KT Mursi, JP Seifert, Y Zhuang
IEEE Transactions on Information Forensics and Security 17, 2719-2731, 2022
342022
pypuf: Cryptanalysis of physically unclonable functions
N Wisiol, C Gräbnitz, C Mühl, B Zengin, T Soroceanu, N Pirnay, KT Mursi, ...
Zenodo, Version 2, 2021
322021
Neural-network-based modeling attacks on xor arbiter pufs revisited
N Wisiol, B Thapaliya, KT Mursi, JP Seifert, Y Zhuang
Cryptology ePrint Archive, 2021
322021
Why attackers lose: Design and security analysis of arbitrarily large XOR arbiter PUFs
N Wisiol, M Margraf
Journal of Cryptographic Engineering 9, 221-230, 2019
302019
Short paper: Xor arbiter pufs have systematic response bias
N Wisiol, N Pirnay
Financial Cryptography and Data Security: 24th International Conference, FC …, 2020
102020
Exploiting structural nonlinearity of a reconfigurable multiple-scattering system
Y Eliezer, U Ruhrmair, N Wisiol, S Bittner, H Cao
arXiv preprint arXiv:2208.08906, 2022
82022
Towards attack resilient arbiter puf-based strong pufs
N Wisiol
Cryptology ePrint Archive, 2021
82021
Machine-learning side-channel attacks on the galactics constant-time implementation of bliss
S Marzougui, N Wisiol, P Gersch, J Krämer, JP Seifert
Proceedings of the 17th International Conference on Availability …, 2022
72022
Disjoint NP-pairs and propositional proof systems
C Glaßer, A Hughes, AL Selman, N Wisiol
ACM SIGACT News 45 (4), 59-75, 2014
62014
Security analysis of delay-based strong PUFs with multiple delay lines
A Aghaie, A Moradi, J Tobisch, N Wisiol
2022 IEEE International Symposium on Hardware Oriented Security and Trust …, 2022
52022
Tunable nonlinear optical mapping in a multiple-scattering cavity
Y Eliezer, U Rührmair, N Wisiol, S Bittner, H Cao
Proceedings of the National Academy of Sciences 120 (31), e2305027120, 2023
42023
Towards attack resilient delay-based strong PUFs
N Wisiol
2022 IEEE International Symposium on Hardware Oriented Security and Trust …, 2022
22022
Attacking RO-PUFs with Enhanced Challenge-Response Pairs
N Wisiol, M Margraf
ICT Systems Security and Privacy Protection: 33rd IFIP TC 11 International …, 2018
22018
Interpose PUF
N Wisiol
Modeling Attack Security of Physical Unclonable Functions based on Arbiter …, 2023
2023
Beli PUF
N Wisiol
Modeling Attack Security of Physical Unclonable Functions based on Arbiter …, 2023
2023
Physical Unclonable Functions
N Wisiol
Modeling Attack Security of Physical Unclonable Functions based on Arbiter …, 2023
2023
LP-PUF
N Wisiol
Modeling Attack Security of Physical Unclonable Functions based on Arbiter …, 2023
2023
XOR Arbiter PUF
N Wisiol
Modeling Attack Security of Physical Unclonable Functions based on Arbiter …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20