Fault-Tolerant Implementations of Physically Unclonable Functions on FPGA
暂无分享,去创建一个
Debdeep Mukhopadhyay | Arnab Bag | Sikhar Patranabis | Rajat Subhra Chakraborty | Durga Prasad Sahoo
[1] Georg T. Becker,et al. On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation , 2015, RFIDSec.
[2] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[3] Frans M. J. Willems,et al. Secure Key Generation from Biased PUFs , 2015, CHES.
[4] Jean-Pierre Seifert,et al. Laser Fault Attack on Physically Unclonable Functions , 2015, 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[5] Jan Sölter,et al. Efficient Power and Timing Side Channels for Physical Unclonable Functions , 2014, CHES.
[6] Srinivas Devadas,et al. FPGA PUF using programmable delay lines , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[7] Jean-Pierre Seifert,et al. Lattice Basis Reduction Attack against Physically Unclonable Functions , 2015, CCS.
[8] Jean-Pierre Seifert,et al. Physical Characterization of Arbiter PUFs , 2014, IACR Cryptol. ePrint Arch..
[9] Srinivas Devadas,et al. PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.
[10] Srinivas Devadas,et al. Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[11] Marco D. Santambrogio,et al. On the Evolution of Hardware Circuits via Reconfigurable Architectures , 2012, TRETS.
[12] Ulrich Rührmair,et al. The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[13] Georg T. Becker,et al. The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs , 2015, CHES.
[14] Debdeep Mukhopadhyay,et al. Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[15] Durga Prasad Sahoo. Design and Analysis of Secure Physically Unclonable Function Compositions , 2017 .
[16] Jeroen Delvaux,et al. Fault Injection Modeling Attacks on 65 nm Arbiter and RO Sum PUFs via Environmental Changes , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.
[17] Sylvain Guilley,et al. An Easy-to-Design PUF Based on a Single Oscillator: The Loop PUF , 2012, 2012 15th Euromicro Conference on Digital System Design.
[18] Marco D. Santambrogio,et al. HERA Project's Holistic Evolutionary Framework , 2013, 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum.
[19] Georg Sigl,et al. Semi-invasive EM attack on FPGA RO PUFs and countermeasures , 2011 .
[20] Roel Maes,et al. Physically Unclonable Functions , 2013, Springer Berlin Heidelberg.
[21] Alessandro Barenghi,et al. Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures , 2012, Proceedings of the IEEE.
[22] Patrick Schaumont,et al. A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions , 2011, IACR Cryptol. ePrint Arch..
[23] Moti Yung,et al. A Comparative Cost/Security Analysis of Fault Attack Countermeasures , 2006, FDTC.
[24] Stefan Katzenbeisser,et al. Converse PUF-Based Authentication , 2012, TRUST.
[25] Oliver Diessel,et al. ICAP-I: A reusable interface for the internal reconfiguration of Xilinx FPGAs , 2009, 2009 International Conference on Field-Programmable Technology.
[26] Abhranil Maiti,et al. Physical unclonable function and true random number generator: a compact and scalable implementation , 2009, GLSVLSI '09.
[27] Ingrid Verbauwhede,et al. Hardware Designer's Guide to Fault Attacks , 2013, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[28] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.
[29] Jeroen Delvaux,et al. Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[30] Debdeep Mukhopadhyay,et al. A Multiplexer-Based Arbiter PUF Composition with Enhanced Reliability and Security , 2018, IEEE Transactions on Computers.
[31] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[32] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.