Jan Sölter

According to our database1, Jan Sölter authored at least 9 papers between 2009 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2014
PUF modeling attacks: An introduction and overview.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

Efficient Power and Timing Side Channels for Physical Unclonable Functions.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
PUF Modeling Attacks on Simulated and Silicon Data.
IEEE Trans. Information Forensics and Security, 2013

Power and Timing Side Channels for PUFs and their Efficient Exploitation.
IACR Cryptology ePrint Archive, 2013

PUF Modeling Attacks on Simulated and Silicon Data.
IACR Cryptology ePrint Archive, 2013

2010
Modeling Attacks on Physical Unclonable Functions.
IACR Cryptology ePrint Archive, 2010

Policy Gradients for Cryptanalysis.
Proceedings of the Artificial Neural Networks - ICANN 2010, 2010

Modeling attacks on physical unclonable functions.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
On the Foundations of Physical Unclonable Functions.
IACR Cryptology ePrint Archive, 2009


  Loading...