Ulrich Rührmair

According to our database1, Ulrich Rührmair authored at least 52 papers between 2009 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks.
IACR Cryptology ePrint Archive, 2018

Efficient Erasable PUFs from Programmable Logic and Memristors.
IACR Cryptology ePrint Archive, 2018

ASHES 2018- Workshop on Attacks and Solutions in Hardware Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Sensitized path PUF: A lightweight embedded physical unclonable function.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

ASHES 2017: Workshop on Attacks and Solutions in Hardware Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
On the formal foundations of PUFs and related primitives.
PhD thesis, 2016

On the Security of PUF Protocols under Bad PUFs and PUFs-inside-PUFs Attacks.
IACR Cryptology ePrint Archive, 2016

2015
Disorder-Based Security Hardware.
PhD thesis, 2015

Security Evaluation and Enhancement of Bistable Ring PUFs.
IACR Cryptology ePrint Archive, 2015

PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management.
IACR Cryptology ePrint Archive, 2015

MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Virtual Proofs of Reality and their Physical Implementation.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Security Evaluation and Enhancement of Bistable Ring PUFs.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2015

Physically secure and fully reconfigurable data storage using optical scattering.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

2014
Virtual Proofs of Reality.
IACR Cryptology ePrint Archive, 2014

PUF Interfaces and their Security.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

PUF modeling attacks: An introduction and overview.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

PUFs at a glance.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

Protocol attacks on advanced PUF protocols and countermeasures.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

Efficient Power and Timing Side Channels for Physical Unclonable Functions.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
PUF Modeling Attacks on Simulated and Silicon Data.
IEEE Trans. Information Forensics and Security, 2013

On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols.
J. Cryptographic Engineering, 2013

Physical unclonable functions based on crossbar arrays for cryptographic applications.
I. J. Circuit Theory and Applications, 2013

Power and Timing Side Channels for PUFs and their Efficient Exploitation.
IACR Cryptology ePrint Archive, 2013

PUF Modeling Attacks on Simulated and Silicon Data.
IACR Cryptology ePrint Archive, 2013

Revisiting Optical Physical Unclonable Functions.
IACR Cryptology ePrint Archive, 2013

Combined Modeling and Side Channel Attacks on Strong PUFs.
IACR Cryptology ePrint Archive, 2013

PUFs in Security Protocols: Attack Models and Security Evaluations.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results.
IACR Cryptology ePrint Archive, 2012

Characterization of the bistable ring PUF.
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012

Practical Security Analysis of PUF-Based Two-Player Protocols.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

SIMPL Systems as a Keyless Cryptographic and Security Primitive.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Circuit-Based Approaches to Simpl Systems.
Journal of Circuits, Systems, and Computers, 2011

SIMPL Systems as a Keyless Cryptographic and Security Primitive.
IACR Cryptology ePrint Archive, 2011

Physical Turing Machines and the Formalization of Physical Cryptography.
IACR Cryptology ePrint Archive, 2011

SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?
Proceedings of the SOFSEM 2011: Theory and Practice of Computer Science, 2011

The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions.
Proceedings of the HOST 2011, 2011

An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Strong PUFs: Models, Constructions, and Security Proofs.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Modeling Attacks on Physical Unclonable Functions.
IACR Cryptology ePrint Archive, 2010

Towards Electrical, Integrated Implementations of SIMPL Systems.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Oblivious Transfer Based on Physical Unclonable Functions.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Audio watermarking forensics: detecting malicious re-embedding.
Proceedings of the Media Forensics and Security II, 2010

Policy Gradients for Cryptanalysis.
Proceedings of the Artificial Neural Networks - ICANN 2010, 2010

Security Applications of Diodes with Unique Current-Voltage Characteristics.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems.
Proceedings of the Communications and Multimedia Security, 2010

Modeling attacks on physical unclonable functions.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
On the Foundations of Physical Unclonable Functions.
IACR Cryptology ePrint Archive, 2009

Towards Electrical, Integrated Implementations of SIMPL Systems.
IACR Cryptology ePrint Archive, 2009

SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions.
IACR Cryptology ePrint Archive, 2009

On-Chip Electric Waves: An Analog Circuit Approach to Physical Uncloneable Functions.
IACR Cryptology ePrint Archive, 2009


  Loading...