A Formalization of the Security Features of Physical Functions
暂无分享,去创建一个
Frederik Armknecht | Ahmad-Reza Sadeghi | François-Xavier Standaert | Roel Maes | Christian Wachsmann | François-Xavier Standaert | Frederik Armknecht | Roel Maes | A. Sadeghi | C. Wachsmann
[1] Helena Handschuh,et al. Hardware intrinsic security from D flip-flops , 2010, STC '10.
[2] Chi-En Daniel Yin,et al. LISA: Maximizing RO PUF's secret extraction , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[3] Boris Skoric,et al. Robust Key Extraction from Physical Uncloneable Functions , 2005, ACNS.
[4] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[5] Berk Sunar,et al. Physical unclonable function with tristate buffers , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[6] W. R. Daasch,et al. IC identification circuit using device mismatch , 2000, 2000 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No.00CH37056).
[7] Ingrid Verbauwhede,et al. Intrinsic PUFs from Flip-flops on Reconfigurable Devices , 2008 .
[8] Jean-Jacques Quisquater,et al. How to strongly link data and its medium: the paper case , 2010, IET Inf. Secur..
[9] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[10] Ingrid Verbauwhede,et al. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions , 2010, Towards Hardware-Intrinsic Security.
[11] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[12] Frank Sehnke,et al. On the Foundations of Physical Unclonable Functions , 2009, IACR Cryptol. ePrint Arch..
[13] Miodrag Potkonjak,et al. Techniques for Design and Implementation of Secure Reconfigurable PUFs , 2009, TRETS.
[14] Daniel E. Holcomb,et al. Low-power sub-threshold design of secure physical unclonable functions , 2010, 2010 ACM/IEEE International Symposium on Low-Power Electronics and Design (ISLPED).
[15] Ahmad-Reza Sadeghi,et al. Reconfigurable Physical Unclonable Functions - Enabling technology for tamper-resistant storage , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[16] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[17] Boris Skoric,et al. An information theoretic model for physical uncloneable functions , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[18] Daniel E. Holcomb,et al. Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags , 2007 .
[19] Jorge Guajardo,et al. Extended abstract: The butterfly PUF protecting IP on every FPGA , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[20] Gang Xiong,et al. Forgery: ‘Fingerprinting’ documents and packaging , 2005, Nature.
[21] Frans M. J. Willems,et al. The context-tree weighting method: basic properties , 1995, IEEE Trans. Inf. Theory.
[22] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[23] Srinivas Devadas,et al. Identification and authentication of integrated circuits , 2004, Concurr. Pract. Exp..
[24] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[25] Boris Skoric,et al. Read-Proof Hardware from Protective Coatings , 2006, CHES.
[26] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).
[27] Krzysztof Pietrzak,et al. A Leakage-Resilient Mode of Operation , 2009, EUROCRYPT.
[28] Patrick Schaumont,et al. A large scale characterization of RO-PUF , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[29] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[30] Frederik Armknecht,et al. Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions , 2009, ASIACRYPT.
[31] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[32] R. Pappu,et al. Physical One-Way Functions , 2002, Science.
[33] Ying Su,et al. A 1.6pJ/bit 96% Stable Chip-ID Generating Circuit using Process Variations , 2007, 2007 IEEE International Solid-State Circuits Conference. Digest of Technical Papers.
[34] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[35] K M Tolk. Reflective particle technology for identification of critical components , 1992 .
[36] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.