Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Niklas Pirnay"'
Autor:
Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)
We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by novel machine learning strategies up to very substantial sizes and complexities. Our
Externí odkaz:
https://doaj.org/article/64b42569ac8a4efe809d878757bfbfab
Density modelling is the task of learning an unknown probability density function from samples, and is one of the central problems of unsupervised machine learning. In this work, we show that there exists a density modelling problem for which fault-t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bf92d76ee4e89ee82c931ff6a04fa286
https://refubium.fu-berlin.de/handle/fub188/39730
https://refubium.fu-berlin.de/handle/fub188/39730
Physical Unclonable Functions (PUFs) have been proposed as a way to identify and authenticate electronic devices. Recently, several ideas have been presented that aim to achieve the same for quantum devices. Some of these constructions apply single-q
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::81600217cb11c9b3685647ad02fdb72d
https://depositonce.tu-berlin.de/handle/11303/17157
https://depositonce.tu-berlin.de/handle/11303/17157
Autor:
Nils Wisiol, Niklas Pirnay
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783030512798
Financial Cryptography
Financial Cryptography
We demonstrate that XOR Arbiter PUFs with an even number of arbiter chains have inherently biased responses, even if all arbiter chains are perfectly unbiased. This rebukes the believe that XOR Arbiter PUFs are, like Arbiter PUFs, unbiased when ideal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3b0aeffb2744aa0b184e01ed48462170
https://doi.org/10.1007/978-3-030-51280-4_4
https://doi.org/10.1007/978-3-030-51280-4_4
Publikováno v:
Proceedings of the 3rd Workshop on System Software for Trusted Execution.
Shielding systems such as AMD's Secure Encrypted Virtualization aim to protect a virtual machine from a higher privileged entity such as the hypervisor. A cornerstone of these systems is the ability to protect the memory from unauthorized accesses. D