PUF-PRFs : A New Tamper-resilient Cryptographic Primitive
暂无分享,去创建一个
[1] Silvio Micali,et al. On the Cryptographic Applications of Random Functions , 1984, CRYPTO.
[2] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[3] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[4] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[5] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[6] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[7] Reinhard Posch. Protecting Devices by Active Coating , 1998, J. Univers. Comput. Sci..
[8] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[9] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[10] R. Pappu,et al. Physical One-Way Functions , 2002, Science.
[11] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[12] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[13] Srinivas Devadas,et al. Controlled physical random functions , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[14] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[15] Silvio Micali,et al. Physically Observable Cryptography (Extended Abstract) , 2004, Theory of Cryptography Conference.
[16] Jean-Jacques Quisquater,et al. A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD , 2003, CHES.
[17] James Tschanz,et al. Parameter variations and impact on circuits and microarchitecture , 2003, Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451).
[18] Silvio Micali,et al. Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering , 2004, TCC.
[19] Jinjun Xiong,et al. Variability-Driven Considerations in the Design of Integrated-Circuit Global Interconnects , 2004 .
[20] Mark G. Karpovsky,et al. Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard , 2004, International Conference on Dependable Systems and Networks, 2004.
[21] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[22] Mark G. Karpovsky,et al. Non-linear Residue Codes for Robust Public-Key Arithmetic , 2006, FDTC.
[23] Fmj Frans Willems,et al. On the security of XOR-method in biometric authentication systems , 2006 .
[24] Boris Skoric,et al. Read-Proof Hardware from Protective Coatings , 2006, CHES.
[25] Ueli Maurer,et al. Unbreakable Keys from Random Noise , 2007 .
[26] Jonathan Katz,et al. Universally Composable Multi-party Computation Using Tamper-Proof Hardware , 2007, EUROCRYPT.
[27] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[28] Amit Sahai,et al. New Constructions for UC Secure Computation Using Tamper-Proof Hardware , 2008, EUROCRYPT.
[29] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[30] Gil Segev,et al. David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware , 2008, EUROCRYPT.
[31] Sangyeun Cho,et al. Decomposition and Analysis of Process Variability Using Constrained Principal Component Analysis , 2008, IEEE Transactions on Semiconductor Manufacturing.
[32] Berk Sunar,et al. Towards Robust Low Cost Authentication for Pervasive Devices , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).