default search action
Michael Pehl
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c27]Martin Schulz, Michael Pehl, Carsten Trinitis:
The European Chips Act and its Impact on Teaching. CF (Companion) 2024 - [c26]Niklas Stein, Michael Pehl:
Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF. COSADE 2024: 157-176 - 2023
- [j11]Christoph Frisch, Florian Wilde, Thomas Holzner, Michael Pehl:
A Practical Approach to Estimate the Min-Entropy in PUFs. J. Hardw. Syst. Secur. 7(4): 138-146 (2023) - [c25]Bernhard Lippmann, Joel Hatsch, Stefan Seidl, Detlef Houdeau, Niranjana Papagudi Subrahmanyam, Daniel Schneider, Malek Safieh, Anne Passarelli, Aliza Maftun, Michaela Brunner, Tim Music, Michael Pehl, Tauseef Siddiqui, Ralf Brederlow, Ulf Schlichtmann, Bjoern Driemeyer, Maurits Ortmanns, Robert Hesselbarth, Matthias Hiller:
VE-FIDES: Designing Trustworthy Supply Chains Using Innovative Fingerprinting Implementations. DATE 2023: 1-6 - [c24]Carl Riehm, Christoph Frisch, Florin Burcea, Matthias Hiller, Michael Pehl, Ralf Brederlow:
Structured Design and Evaluation of a Resistor-Based PUF Robust Against PVT-Variations. DDECS 2023: 93-98 - [e1]Elif Bilge Kavun, Michael Pehl:
Constructive Side-Channel Analysis and Secure Design - 14th International Workshop, COSADE 2023, Munich, Germany, April 3-4, 2023, Proceedings. Lecture Notes in Computer Science 13979, Springer 2023, ISBN 978-3-031-29496-9 [contents] - 2022
- [j10]Lars Tebelmann, Jean-Luc Danger, Michael Pehl:
Interleaved Challenge Loop PUF: A Highly Side-Channel Protected Oscillator-Based PUF. IEEE Trans. Circuits Syst. I Regul. Pap. 69(12): 5121-5134 (2022) - [j9]Jonas Ruchti, Michael Gruber, Michael Pehl:
When the Decoder Has to Look Twice: Glitching a PUF Error Correction. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 26-70 (2022) - [j8]Seyed Hamidreza Moghadas, Michael Pehl, Georg Sigl:
ROPAD: Enhancing the Digital Ring Oscillator Probing Attempt Detector for Protecting Irregular Data Buses. IEEE Trans. Very Large Scale Integr. Syst. 30(11): 1716-1727 (2022) - [c23]Lars Tebelmann, Moritz Wettermann, Michael Pehl:
On-Chip Side-Channel Analysis of the Loop PUF. ASHES@CCS 2022: 55-63 - [c22]Christoph Frisch, Michael Pehl:
Beware of the Bias - Statistical Performance Evaluation of Higher-Order Alphabet PUFs. DATE 2022: 1005-1010 - [c21]Claus Kestel, Christoph Frisch, Michael Pehl, Norbert Wehn:
Towards More Secure PUF Applications: A Low-Area Polar Decoder Implementation. SOCC 2022: 1-6 - 2021
- [j7]Emanuele Strieder, Christoph Frisch, Michael Pehl:
Machine Learning of Physical Unclonable Functions using Helper Data Revealing a Pitfall in the Fuzzy Commitment Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2): 1-36 (2021) - [c20]Lars Tebelmann, Ulrich Kühne, Jean-Luc Danger, Michael Pehl:
Analysis and Protection of the Two-Metric Helper Data Scheme. COSADE 2021: 279-302 - [c19]Md Toufiq Hasan Anik, Jean-Luc Danger, Omar Diankha, Mohammad Ebrahimabadi, Christoph Frisch, Sylvain Guilley, Naghmeh Karimi, Michael Pehl, Sofiane Takarabt:
Testing and Reliability Enhancement of Security Primitives. DFT 2021: 1-8 - [i7]Lars Tebelmann, Ulrich Kühne, Jean-Luc Danger, Michael Pehl:
Analysis and Protection of the Two-metric Helper Data Scheme. IACR Cryptol. ePrint Arch. 2021: 830 (2021) - [i6]Jonas Ruchti, Michael Gruber, Michael Pehl:
When the Decoder Has to Look Twice: Glitching a PUF Error Correction. IACR Cryptol. ePrint Arch. 2021: 958 (2021) - 2020
- [c18]Lars Tebelmann, Jean-Luc Danger, Michael Pehl:
Self-secured PUF: Protecting the Loop PUF by Masking. COSADE 2020: 293-314 - [c17]Seyed Hamidreza Moghadas, Michael Pehl:
ROPAD: A Fully Digital Highly Predictive Ring Oscillator Probing Attempt Detector. DAC 2020: 1-6 - [c16]Michael Pehl, Tobias Tretschok, Daniel Becker, Vincent Immler:
Spatial Context Tree Weighting for Physical Unclonable Functions. ECCTD 2020: 1-4 - [c15]Christoph Frisch, Michael Tempelmeier, Michael Pehl:
PAG-IoT: A PUF and AEAD Enabled Trusted Hardware Gateway for IoT Devices. ISVLSI 2020: 500-505 - [i5]Lars Tebelmann, Jean-Luc Danger, Michael Pehl:
Self-Secured PUF: Protecting the Loop PUF by Masking. IACR Cryptol. ePrint Arch. 2020: 145 (2020) - [i4]Florian Unterstein, Tolga Sel, Thomas Zeschg, Nisha Jacob, Michael Tempelmeier, Michael Pehl, Fabrizio De Santis:
Secure Update of FPGA-based Secure Elements using Partial Reconfiguration. IACR Cryptol. ePrint Arch. 2020: 833 (2020) - [i3]Emanuele Strieder, Christoph Frisch, Michael Pehl:
Machine Learning of Physical Unclonable Functions using Helper Data, Revealing a Pitfall in the Fuzzy Commitment Scheme. IACR Cryptol. ePrint Arch. 2020: 888 (2020)
2010 – 2019
- 2019
- [j6]Johanna Sepúlveda, Felix Wilgerodt, Michael Pehl:
Towards memory integrity and authenticity of multi-processors system-on-chip using physical unclonable functions. it Inf. Technol. 61(1): 29-43 (2019) - [c14]Lars Tebelmann, Michael Pehl, Vincent Immler:
Side-Channel Analysis of the TERO PUF. COSADE 2019: 43-60 - [c13]Florian Wilde, Michael Pehl:
On the Confidence in Bit-Alias Measurement of Physical Unclonable Functions. NEWCAS 2019: 1-4 - [c12]Florian Wilde, Christoph Frisch, Michael Pehl:
Efficient Bound for Conditional Min-Entropy of Physical Unclonable Functions Beyond IID. WIFS 2019: 1-6 - [i2]Lars Tebelmann, Michael Pehl, Vincent Immler:
Side-Channel Analysis of the TERO PUF. IACR Cryptol. ePrint Arch. 2019: 312 (2019) - 2018
- [j5]Florian Wilde, Berndt M. Gammel, Michael Pehl:
Spatial Correlation Analysis on Physical Unclonable Functions. IEEE Trans. Inf. Forensics Secur. 13(6): 1468-1480 (2018) - [c11]Georg Sigl, Mathieu Gross, Michael Pehl:
Where Technology Meets Security: Key Storage and Data Separation for System-on-Chips. ESSCIRC 2018: 12-17 - [c10]Johanna Sepúlveda, Felix Wilgerodt, Michael Pehl:
SEPUFSoC: Using PUFs for Memory Integrity and Authentication in Multi-Processors System-on-Chip. ACM Great Lakes Symposium on VLSI 2018: 39-44 - [c9]Andreas Herrmann, Michael Weiner, Michael Pehl, Helmut Graeb:
Bringing Analog Design Tools to Security: Modeling and Optimization of a Low Area Probing Detector. SMACD 2018: 1-4 - 2017
- [c8]Lars Tebelmann, Michael Pehl, Georg Sigl:
EM Side-Channel Analysis of BCH-based Error Correction for PUF-based Key Generation. ASHES@CCS 2017: 43-52 - [c7]Nisha Jacob, Jakob Wittmann, Johann Heyszl, Robert Hesselbarth, Florian Wilde, Michael Pehl, Georg Sigl, Kai Fischer:
Securing FPGA SoC configurations independent of their manufacturers. SoCC 2017: 114-119 - 2016
- [j4]Michael Pehl, Matthias Hiller, Helmut Graeb:
Efficient Evaluation of Physical Unclonable Functions Using Entropy Measures. J. Circuits Syst. Comput. 25(1): 1640001:1-1640001:23 (2016) - [i1]Matthias Hiller, Michael Pehl, Gerhard Kramer, Georg Sigl:
Algebraic Security Analysis of Key Generation with Physical Unclonable Functions. IACR Cryptol. ePrint Arch. 2016: 854 (2016) - 2015
- [j3]Matthias Hiller, Michael Pehl, Georg Sigl:
Fehlerkorrekturverfahren zur sicheren Schlüsselerzeugung mit Physical Unclonable Functions. Datenschutz und Datensicherheit 39(4): 229-233 (2015) - [c6]Matthias Hiller, Meng-Day (Mandel) Yu, Michael Pehl:
Systematic Low Leakage Coding for Physical Unclonable Functions. AsiaCCS 2015: 155-166 - 2014
- [j2]Michael Pehl, Hermann Seuschek:
Herausforderungen der ganzheitlichen Absicherung eingebetteter Systeme. Datenschutz und Datensicherheit 38(11): 757-761 (2014) - [c5]Michael Pehl, Akshara Ranjit Punnakkal, Matthias Hiller, Helmut Graeb:
Advanced performance metrics for Physical Unclonable Functions. ISIC 2014: 136-139 - [c4]Florian Wilde, Matthias Hiller, Michael Pehl:
Statistic-based security analysis of ring oscillator PUFs. ISIC 2014: 148-151 - 2013
- [c3]Matthias Hiller, Georg Sigl, Michael Pehl:
A new model for estimating bit error probabilities of Ring-Oscillator PUFs. ReCoSoC 2013: 1-8 - 2012
- [j1]Michael Pehl, Helmut E. Graeb:
Tolerance Design of Analog Circuits using a Branch-and-Bound Based Approach. J. Circuits Syst. Comput. 21(8) (2012) - 2010
- [c2]Michael Pehl, Michael Zwerger, Helmut E. Graeb:
Sizing analog circuits using an SQP and Branch and Bound based approach. ICECS 2010: 37-40
2000 – 2009
- 2008
- [c1]Michael Pehl, Tobias Massier, Helmut E. Graeb, Ulf Schlichtmann:
A random and pseudo-gradient approach for analog circuit sizing with non-uniformly discretized parameters. ICCD 2008: 188-193
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-19 23:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint