Ulrich Rührmair

Orcid: 0000-0003-0156-6738

Affiliations:
  • Ruhr-Universität Bochum, Germany
  • Technical University Munich, Germany (former)


According to our database1, Ulrich Rührmair authored at least 76 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Systematically Quantifying Cryptanalytic Nonlinearities in Strong PUFs.
IEEE Trans. Inf. Forensics Secur., 2024

CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Strong PUF Security Metrics: Sensitivity of Responses to Single Challenge Bit Flips.
IACR Cryptol. ePrint Arch., 2024

Design of Novel Analog Compute Paradigms with Ark.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

2023
The ASHES 2021 special issue at JCEN.
J. Cryptogr. Eng., November, 2023

Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature.
IEEE Trans. Inf. Forensics Secur., 2023

Security layers and related services within the Horizon Europe NEUROPULS project.
CoRR, 2023

NEUROPULS: NEUROmorphic energy-efficient secure accelerators based on Phase change materials aUgmented siLicon photonicS.
CoRR, 2023

Physical Realization of a Hyper Unclonable Function.
CoRR, 2023


ASHES '23: Workshop on Attacks and Solutions in Hardware Security.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Secret-free security: a survey and tutorial.
J. Cryptogr. Eng., 2022

Programmable access-controlled and generic erasable PUF design and its applications.
J. Cryptogr. Eng., 2022

The ASHES 2020 special issue at JCEN.
J. Cryptogr. Eng., 2022

Systematically Quantifying Cryptanalytic Non-Linearities in Strong PUFs.
IACR Cryptol. ePrint Arch., 2022

SpyHammer: Using RowHammer to Remotely Spy on Temperature.
CoRR, 2022

Quantifying the Sensitivity and Unclonability of Optical Physical Unclonable Functions.
CoRR, 2022

Strong PUF Security Metrics: Response Sensitivity to Small Challenge Perturbations.
Proceedings of the 23rd International Symposium on Quality Electronic Design, 2022

ASHES 2022 - 6th Workshop on Attacks and Solutions in Hardware Security.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
The ASHES 2019 special issue at JCEN.
J. Cryptogr. Eng., 2021

Recent Advances in Photonic Physical Unclonable Functions.
Proceedings of the 26th IEEE European Test Symposium, 2021

2020
Splitting the Interpose PUF: A Novel Modeling Attack Strategy.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Using Universal Composition to Design and Analyze Secure Complex Hardware Systems.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

SoK: Towards Secret-Free Security.
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2020

Erasable PUFs: Formal Treatment and Generic Design.
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2020

ASHES 2020: 4th Workshop on Attacks and Solutions in Hardware Security.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Emerging Attacks and Solutions for Secure Hardware in the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2019

The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Towards Secret-Free Security.
IACR Cryptol. ePrint Arch., 2019

ASHES 2019: 3rd Workshop on Attacks and Solutions in Hardware Security.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Efficient Erasable PUFs from Programmable Logic and Memristors.
IACR Cryptol. ePrint Arch., 2018

ASHES 2018- Workshop on Attacks and Solutions in Hardware Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Sensitized path PUF: A lightweight embedded physical unclonable function.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

ASHES 2017: Workshop on Attacks and Solutions in Hardware Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
On the formal foundations of PUFs and related primitives.
PhD thesis, 2016

On the Security of PUF Protocols under Bad PUFs and PUFs-inside-PUFs Attacks.
IACR Cryptol. ePrint Arch., 2016

2015
Disorder-Based Security Hardware.
PhD thesis, 2015

Security Evaluation and Enhancement of Bistable Ring PUFs.
IACR Cryptol. ePrint Arch., 2015

PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management.
IACR Cryptol. ePrint Arch., 2015

MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Virtual Proofs of Reality and their Physical Implementation.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Physically secure and fully reconfigurable data storage using optical scattering.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

2014
Virtual Proofs of Reality.
IACR Cryptol. ePrint Arch., 2014

PUF Interfaces and their Security.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

PUF modeling attacks: An introduction and overview.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

PUFs at a glance.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

Protocol attacks on advanced PUF protocols and countermeasures.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

Efficient Power and Timing Side Channels for Physical Unclonable Functions.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
PUF Modeling Attacks on Simulated and Silicon Data.
IEEE Trans. Inf. Forensics Secur., 2013

On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols.
J. Cryptogr. Eng., 2013

Physical unclonable functions based on crossbar arrays for cryptographic applications.
Int. J. Circuit Theory Appl., 2013

Power and Timing Side Channels for PUFs and their Efficient Exploitation.
IACR Cryptol. ePrint Arch., 2013

Revisiting Optical Physical Unclonable Functions.
IACR Cryptol. ePrint Arch., 2013

Combined Modeling and Side Channel Attacks on Strong PUFs.
IACR Cryptol. ePrint Arch., 2013

PUFs in Security Protocols: Attack Models and Security Evaluations.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results.
IACR Cryptol. ePrint Arch., 2012

Characterization of the bistable ring PUF.
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012

Practical Security Analysis of PUF-Based Two-Player Protocols.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
Circuit-Based Approaches to Simpl Systems.
J. Circuits Syst. Comput., 2011

SIMPL Systems as a Keyless Cryptographic and Security Primitive.
IACR Cryptol. ePrint Arch., 2011

Physical Turing Machines and the Formalization of Physical Cryptography.
IACR Cryptol. ePrint Arch., 2011

SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?
Proceedings of the SOFSEM 2011: Theory and Practice of Computer Science, 2011

The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions.
Proceedings of the HOST 2011, 2011

An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Strong PUFs: Models, Constructions, and Security Proofs.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Modeling Attacks on Physical Unclonable Functions.
IACR Cryptol. ePrint Arch., 2010

Oblivious Transfer Based on Physical Unclonable Functions.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Audio watermarking forensics: detecting malicious re-embedding.
Proceedings of the Media Forensics and Security II, 2010

Policy Gradients for Cryptanalysis.
Proceedings of the Artificial Neural Networks - ICANN 2010, 2010

Security Applications of Diodes with Unique Current-Voltage Characteristics.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems.
Proceedings of the Communications and Multimedia Security, 2010

2009
On the Foundations of Physical Unclonable Functions.
IACR Cryptol. ePrint Arch., 2009

Towards Electrical, Integrated Implementations of SIMPL Systems.
IACR Cryptol. ePrint Arch., 2009

SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions.
IACR Cryptol. ePrint Arch., 2009

On-Chip Electric Waves: An Analog Circuit Approach to Physical Uncloneable Functions.
IACR Cryptol. ePrint Arch., 2009


  Loading...