Modeling attacks on physical unclonable functions U Rührmair, F Sehnke, J Sölter, G Dror, S Devadas, J Schmidhuber Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 1193 | 2010 |
PUF modeling attacks on simulated and silicon data U Rührmair, J Sölter, F Sehnke, X Xu, A Mahmoud, V Stoyanova, G Dror, ... IEEE transactions on information forensics and security 8 (11), 1876-1891, 2013 | 700 | 2013 |
Introduction to hardware security and trust M Tehranipoor, C Wang Springer Science & Business Media, 2011 | 592 | 2011 |
The bistable ring PUF: A new architecture for strong physical unclonable functions Q Chen, G Csaba, P Lugli, U Schlichtmann, U Rührmair 2011 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2011 | 279 | 2011 |
On the foundations of physical unclonable functions U Rührmair, J Sölter, F Sehnke Cryptology ePrint Archive, 2009 | 223 | 2009 |
Security based on physical unclonability and disorder U Rührmair, S Devadas, F Koushanfar Introduction to Hardware Security and Trust, 65-102, 2011 | 214 | 2011 |
PUFs at a glance U Rührmair, DE Holcomb 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014 | 207 | 2014 |
The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks PH Nguyen, DP Sahoo, C Jin, K Mahmood, U Rührmair, M Van Dijk Cryptology ePrint Archive, 2018 | 206 | 2018 |
PUFs in security protocols: Attack models and security evaluations U Rührmair, M van Dijk 2013 IEEE symposium on security and privacy, 286-300, 2013 | 178 | 2013 |
Combined modeling and side channel attacks on strong PUFs A Mahmoud, U Rührmair, M Majzoobi, F Koushanfar Cryptology ePrint Archive, 2013 | 178 | 2013 |
Efficient power and timing side channels for physical unclonable functions U Rührmair, X Xu, J Sölter, A Mahmoud, M Majzoobi, F Koushanfar, ... Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014 | 176 | 2014 |
Strong PUFs: models, constructions, and security proofs U Rührmair, H Busch, S Katzenbeisser Towards Hardware-Intrinsic Security: Foundations and Practice, 79-96, 2010 | 157 | 2010 |
PUF modeling attacks: An introduction and overview U Ruhrmair, J Solter 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014 | 138 | 2014 |
Towards hardware-intrinsic security AR Sadeghi, D Naccache Springer Berlin Heidelberg, 2010 | 118 | 2010 |
Splitting the interpose PUF: A novel modeling attack strategy N Wisiol, C Mühl, N Pirnay, PH Nguyen, M Margraf, JP Seifert, M Van Dijk, ... IACR Transactions on Cryptographic Hardware and Embedded Systems, 97-120, 2020 | 113 | 2020 |
PUF modeling attacks: An introduction and overview U Rührmair, J Sölter 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014 | 110 | 2014 |
Applications of high-capacity crossbar memories in cryptography U Rührmair, C Jaeger, M Bator, M Stutzmann, P Lugli, G Csaba IEEE Transactions on Nanotechnology 10 (3), 489-498, 2010 | 104 | 2010 |
Oblivious transfer based on physical unclonable functions U Rührmair International conference on trust and trustworthy computing, 430-440, 2010 | 102 | 2010 |
Optical pufs reloaded U Rührmair, C Hilgers, S Urban, A Weiershäuser, E Dinter, B Forster, ... Cryptology ePrint Archive, 2013 | 95 | 2013 |
Physical unclonable functions in cryptographic protocols: Security proofs and impossibility results M Van Dijk, U Rührmair Cryptology ePrint Archive, 2012 | 78 | 2012 |