Nils Wisiol

Orcid: 0000-0003-2606-614X

According to our database1, Nils Wisiol authored at least 21 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Automatic DNSSEC Bootstrapping Using Authenticated Signals from the Zone's Operator.
RFC, July, 2024

2023
Modeling Attack Security of Physical Unclonable Functions based on Arbiter PUFs
Springer, ISBN: 978-3-031-29206-4, 2023

2022
Modeling attack security of physical unclonable functions based on arbiter PUFs.
PhD thesis, 2022

Neural Network Modeling Attacks on Arbiter-PUF-Based Designs.
IEEE Trans. Inf. Forensics Secur., 2022

Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling.
IACR Cryptol. ePrint Arch., 2022

Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines.
IACR Cryptol. ePrint Arch., 2022

Towards Attack Resilient Delay-Based Strong PUFs.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2022

Oh SSH-it, What's My Fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022

Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited.
IACR Cryptol. ePrint Arch., 2021

Towards Attack Resilient Arbiter PUF-Based Strong PUFs.
IACR Cryptol. ePrint Arch., 2021

Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Splitting the Interpose PUF: A Novel Modeling Attack Strategy.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

2019
Why attackers lose: design and security analysis of arbitrarily large XOR arbiter PUFs.
J. Cryptogr. Eng., 2019

Short Paper: XOR Arbiter PUFs have Systematic Response Bias.
IACR Cryptol. ePrint Arch., 2019

Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance.
IACR Cryptol. ePrint Arch., 2019

Towards Secure Strong PUFs.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

XOR Arbiter PUFs: an Empirical Approach to Input Transformations.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

2018
Attacking RO-PUFs with Enhanced Challenge-Response Pairs.
IACR Cryptol. ePrint Arch., 2018

2017
Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs.
IACR Cryptol. ePrint Arch., 2017

2014
Disjoint NP-Pairs and Propositional Proof Systems.
SIGACT News, 2014


  Loading...