Splitting the interpose PUF: A novel modeling attack strategy N Wisiol, C Mühl, N Pirnay, PH Nguyen, M Margraf, JP Seifert, M Van Dijk, ... IACR Transactions on Cryptographic Hardware and Embedded Systems, 97-120, 2020 | 106 | 2020 |
Neural network modeling attacks on arbiter-PUF-based designs N Wisiol, B Thapaliya, KT Mursi, JP Seifert, Y Zhuang IEEE Transactions on Information Forensics and Security 17, 2719-2731, 2022 | 43 | 2022 |
Breaking the lightweight secure PUF: Understanding the relation of input transformations and machine learning resistance N Wisiol, GT Becker, M Margraf, TAA Soroceanu, J Tobisch, B Zengin Smart Card Research and Advanced Applications: 18th International Conference …, 2020 | 41 | 2020 |
pypuf: Cryptanalysis of physically unclonable functions N Wisiol, C Gräbnitz, C Mühl, B Zengin, T Soroceanu, N Pirnay, KT Mursi, ... Zenodo, Version 2, 2021 | 36 | 2021 |
Neural-network-based modeling attacks on xor arbiter pufs revisited N Wisiol, B Thapaliya, KT Mursi, JP Seifert, Y Zhuang Cryptology ePrint Archive, 2021 | 34 | 2021 |
Why attackers lose: Design and security analysis of arbitrarily large XOR arbiter PUFs N Wisiol, M Margraf Journal of Cryptographic Engineering 9, 221-230, 2019 | 31 | 2019 |
Short paper: Xor arbiter pufs have systematic response bias N Wisiol, N Pirnay Financial Cryptography and Data Security: 24th International Conference, FC …, 2020 | 10 | 2020 |
Tunable nonlinear optical mapping in a multiple-scattering cavity Y Eliezer, U Rührmair, N Wisiol, S Bittner, H Cao Proceedings of the National Academy of Sciences 120 (31), e2305027120, 2023 | 9 | 2023 |
Towards attack resilient arbiter puf-based strong pufs N Wisiol Cryptology ePrint Archive, 2021 | 9 | 2021 |
Machine-learning side-channel attacks on the galactics constant-time implementation of bliss S Marzougui, N Wisiol, P Gersch, J Krämer, JP Seifert Proceedings of the 17th International Conference on Availability …, 2022 | 8 | 2022 |
Exploiting structural nonlinearity of a reconfigurable multiple-scattering system Y Eliezer, U Ruhrmair, N Wisiol, S Bittner, H Cao arXiv preprint arXiv:2208.08906, 2022 | 8 | 2022 |
Disjoint NP-pairs and propositional proof systems C Glaßer, A Hughes, AL Selman, N Wisiol ACM SIGACT News 45 (4), 59-75, 2014 | 6 | 2014 |
Security analysis of delay-based strong PUFs with multiple delay lines A Aghaie, A Moradi, J Tobisch, N Wisiol 2022 IEEE International Symposium on Hardware Oriented Security and Trust …, 2022 | 5 | 2022 |
Towards attack resilient delay-based strong PUFs N Wisiol 2022 IEEE International Symposium on Hardware Oriented Security and Trust …, 2022 | 2 | 2022 |
Attacking RO-PUFs with Enhanced Challenge-Response Pairs N Wisiol, M Margraf ICT Systems Security and Privacy Protection: 33rd IFIP TC 11 International …, 2018 | 2 | 2018 |
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: A Case Study on Gaussian Sampling N Wisiol, P Gersch, JP Seifert International Conference on Smart Card Research and Advanced Applications …, 2022 | 1 | 2022 |
Interpose PUF N Wisiol Modeling Attack Security of Physical Unclonable Functions based on Arbiter …, 2023 | | 2023 |
Beli PUF N Wisiol Modeling Attack Security of Physical Unclonable Functions based on Arbiter …, 2023 | | 2023 |
Physical Unclonable Functions N Wisiol Modeling Attack Security of Physical Unclonable Functions based on Arbiter …, 2023 | | 2023 |
LP-PUF N Wisiol Modeling Attack Security of Physical Unclonable Functions based on Arbiter …, 2023 | | 2023 |