A Deep Learning Attack Countermeasure with Intentional Noise for a PUF-Based Authentication Scheme
暂无分享,去创建一个
[1] Rajat Subhra Chakraborty,et al. Deep Learning based Model Building Attacks on Arbiter PUF Compositions , 2019, IACR Cryptol. ePrint Arch..
[2] Ingrid Verbauwhede,et al. PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator , 2012, CHES.
[3] Yuejiang Wen,et al. Improving Security and Reliability of Physical Unclonable Functions Using Machine Learning , 2018 .
[4] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[5] Stefan Katzenbeisser,et al. Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs , 2012, Financial Cryptography.
[6] Makoto Ikeda,et al. PUFNet: A Deep Neural Network Based Modeling Attack for Physically Unclonable Function , 2019, 2019 IEEE International Symposium on Circuits and Systems (ISCAS).
[7] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[8] Kazukuni Kobara,et al. Evaluation of Physical Unclonable Functions for 28-nm Process Field-Programmable Gate Arrays , 2014, J. Inf. Process..
[9] Alan Zimmerman,et al. Protecting Your Intellectual Property Rights , 2013 .
[10] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[11] Jeroen Delvaux,et al. Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[12] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[13] Srinivas Devadas,et al. FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise , 2017, Cryptogr..
[14] Mitsugu Iwamoto,et al. A New Arbiter PUF for Enhancing Unpredictability on FPGA , 2015, TheScientificWorldJournal.
[15] Ingrid Verbauwhede,et al. Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs , 2009, CHES.
[16] Yevgeniy Dodis,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.
[17] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[18] Srinivas Devadas,et al. Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions , 2017, IEEE Transactions on Dependable and Secure Computing.
[19] Mahmoud Khalafalla,et al. PUFs Deep Attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs , 2019, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[20] Mitsugu Iwamoto,et al. Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants , 2016, IWSEC.
[21] Georg T. Becker,et al. The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs , 2015, CHES.