Secret-key binding to physical identifiers with reliability guarantees
暂无分享,去创建一个
[1] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[2] Frans M. J. Willems,et al. Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[3] Onur Günlü,et al. Reliable secret key generation from physical unclonable functions under varying environmental conditions , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[4] Onur Günlü,et al. Reliable secret-key binding for physical unclonable functions with transform coding , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[5] Patrick Schaumont,et al. A large scale characterization of RO-PUF , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[6] Martin Bossert,et al. On Error Correction for Physical Unclonable Functions , 2015, ArXiv.
[7] Yili Hong,et al. On Computing the Distribution Function for the Sum of Independent and Non-identical Random Indicators Yili Hong , 2011 .
[8] William K. Pratt,et al. Scene Adaptive Coder , 1984, IEEE Trans. Commun..
[9] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[10] Onur Günlü,et al. DCT based ring oscillator Physical Unclonable Functions , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[11] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[12] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[13] Maximilian Hofer,et al. Physical Unclonable Functions in Theory and Practice , 2012 .
[14] Aaron D. Wyner,et al. A theorem on the entropy of certain binary sequences and applications-I , 1973, IEEE Trans. Inf. Theory.
[15] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003 .
[16] Frans M. J. Willems,et al. Privacy-leakage codes for biometric authentication systems , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[17] Frans M. J. Willems,et al. Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.
[18] Blaise L. P. Gassend,et al. Physical random functions , 2003 .
[19] David R. Anderson,et al. Model selection and multimodel inference : a practical information-theoretic approach , 2003 .
[20] Ingrid Verbauwhede,et al. PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator , 2012, CHES.
[21] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[22] H. Vincent Poor,et al. Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.
[23] Ruye Wang,et al. Introduction to Orthogonal Transforms: With Applications in Data Processing and Analysis , 2012 .