From Statistics to Circuits: Foundations for Future Physical Unclonable Functions
暂无分享,去创建一个
Patrick Schaumont | Inyoung Kim | Leyla Nazhandali | Abhranil Maiti | Vignesh Vivekraja | Huaiye Zhang | A. Maiti | P. Schaumont | Inyoung Kim | L. Nazhandali | Huaiye Zhang | Vignesh Vivekraja
[1] Michael R. Chernick,et al. Nonparametric Statistics, With Applications to Science and Engineering , 2008 .
[2] A. Chandrakasan,et al. A 180-mV subthreshold FFT processor using a minimum energy design methodology , 2005, IEEE Journal of Solid-State Circuits.
[3] Bernie Mulgrew,et al. IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems , 1998 .
[4] Berk Sunar,et al. CDs Have Fingerprints Too , 2009, CHES.
[5] Ahmad-Reza Sadeghi,et al. Efficient Helper Data Key Extractor on FPGAs , 2008, CHES.
[6] Jorge Guajardo,et al. Extended abstract: The butterfly PUF protecting IP on every FPGA , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[7] Gang Xiong,et al. Forgery: ‘Fingerprinting’ documents and packaging , 2005, Nature.
[8] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[9] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.
[10] Puneet Gupta,et al. Manufacturing-aware physical design , 2003, ICCAD-2003. International Conference on Computer Aided Design (IEEE Cat. No.03CH37486).
[11] M. Kenward,et al. An Introduction to the Bootstrap , 2007 .
[12] Patrick Schaumont,et al. Securing embedded systems , 2006, IEEE Security & Privacy.
[13] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[14] Robert Tibshirani,et al. An Introduction to the Bootstrap CHAPMAN & HALL/CRC , 1993 .
[15] Ingrid Verbauwhede,et al. Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs , 2009, CHES.
[16] Federated Tnc. TCG Trusted Network Connect , 2009 .
[17] Patrick Schaumont,et al. Improving the quality of a Physical Unclonable Function using configurable Ring Oscillators , 2009, 2009 International Conference on Field Programmable Logic and Applications.
[18] Vivek De,et al. Adaptive body bias for reducing impacts of die-to-die and within-die parameter variations on microprocessor frequency and leakage , 2002, 2002 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No.02CH37315).
[19] Ming Zhang,et al. Built-In Proactive Tuning System for Circuit Aging Resilience , 2008, 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems.
[20] Farinaz Koushanfar,et al. Robust stable radiometric fingerprinting for wireless devices , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[21] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[22] Brani Vidakovic,et al. Nonparametric Statistics with Applications to Science and Engineering (Wiley Series in Probability and Statistics) , 2007 .
[23] Dhruva Acharyya,et al. A physical unclonable function defined using power distribution system equivalent resistance variations , 2009, 2009 46th ACM/IEEE Design Automation Conference.
[24] Darko Kirovski,et al. RF-DNA: Radio-Frequency Certificates of Authenticity , 2007, CHES.
[25] R. Engelbrecht,et al. DIGEST of TECHNICAL PAPERS , 1959 .
[26] Bo Yang,et al. Statistical prediction of circuit aging under process variations , 2008, 2008 IEEE Custom Integrated Circuits Conference.
[27] R. Pappu,et al. Physical One-Way Functions , 2002, Science.
[28] Ying Su,et al. A 1.6pJ/bit 96% Stable Chip-ID Generating Circuit using Process Variations , 2007, 2007 IEEE International Solid-State Circuits Conference. Digest of Technical Papers.
[29] Tam Tom Kevenaar,et al. Information-theoretic analysis of capacitive physical unclonable functions , 2006 .
[30] Boris Skoric,et al. Experimental Hardware for Coating PUFs and Optical PUFs , 2007 .
[31] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[32] J. Plusquellic,et al. Measuring Power Distribution System Resistance Variations , 2008, IEEE Transactions on Semiconductor Manufacturing.
[33] Philip Heng Wai Leong,et al. Towards a unique FPGA-based identification circuit using process variations , 2009, 2009 International Conference on Field Programmable Logic and Applications.
[34] Miodrag Potkonjak,et al. Techniques for Design and Implementation of Secure Reconfigurable PUFs , 2009, TRETS.
[35] K. Seki,et al. Circuit aging simulator (CAS) , 1988, Technical Digest., International Electron Devices Meeting.
[36] Gang Qu,et al. Temperature-aware cooperative ring oscillator PUF , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[37] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[38] B. P. Murphy,et al. Handbook of Methods of Applied Statistics , 1968 .
[39] Berk Sunar,et al. Physical unclonable function with tristate buffers , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[40] Peter M. Lee. BERT - CIRCUIT AGING SIMULATOR (CAS) , 1990 .
[41] Kaushik Roy,et al. Ultra-low power DLMS adaptive filter for hearing aid applications , 2001, ISLPED '01.
[42] Alex K. Jones,et al. Guest Editors’ Introduction to Security in Reconfigurable Systems Design , 2009, TRETS.
[43] Anantha Chandrakasan,et al. An Energy Efficient Sub-Threshold Baseband Processor Architecture for Pulsed Ultra-Wideband Communications , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.