Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions
暂无分享,去创建一个
François Durvaux | François-Xavier Standaert | François Koeune | Stéphanie Kerckhof | Benoît Gérard | François-Xavier Standaert | Benoît Gérard | F. Koeune | François Durvaux | Stéphanie Kerckhof
[1] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[2] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[3] Frederik Armknecht,et al. A Formalization of the Security Features of Physical Functions , 2011, 2011 IEEE Symposium on Security and Privacy.
[4] Berk Sunar,et al. Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings , 2005, CHES.
[5] Saar Drimer,et al. Authentication of FPGA Bitstreams: Why and How , 2007, ARC.
[6] Tarek El-Ghazawi,et al. Reconfigurable Computing: Architectures, Tools, and Applications , 2014, Lecture Notes in Computer Science.
[7] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[8] Denis Réal,et al. SCARE of an Unknown Hardware Feistel Implementation , 2008, CARDIS.
[9] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[10] Paulo S. L. M. Barreto,et al. Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings , 2010, LATINCRYPT.
[11] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[12] Vishal Monga,et al. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.
[13] Frédéric Valette,et al. SCARE of the DES , 2005, ACNS.
[14] Alessandro Barenghi,et al. On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs , 2011, CCS '11.
[15] Miodrag Potkonjak,et al. Watermarking techniques for intellectual property protection , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[16] Christof Paar,et al. Security on FPGAs: State-of-the-art implementations and attacks , 2004, TECS.
[17] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[18] Tim Güneysu,et al. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices , 2012, AFRICACRYPT.
[19] Christophe Clavier,et al. Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings , 2009, CHES.
[20] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2003 , 2003, Lecture Notes in Computer Science.
[21] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[22] Christof Paar,et al. Building a Side Channel Based Disassembler , 2010, Trans. Comput. Sci..
[23] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[24] Miodrag Potkonjak,et al. Robust IP watermarking methodologies for physical design , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[25] Patrick Schaumont,et al. Offline Hardware/Software Authentication for Reconfigurable Platforms , 2006, CHES.
[26] Christof Paar,et al. Side-channel based watermarks for integrated circuits , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[27] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[28] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[29] Dick James,et al. The State-of-the-Art in IC Reverse Engineering , 2009, CHES.
[30] David Naccache,et al. Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001 .
[31] Mitsuru Matsui,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[32] Benoit M. Macq,et al. A robust soft hash algorithm for digital image signature , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[33] Denis Réal,et al. Defeating Any Secret Cryptography with SCARE Attacks , 2010, LATINCRYPT.
[34] François Durvaux,et al. Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure , 2012, IACR Cryptol. ePrint Arch..
[35] Niel Shell,et al. Point at infinity , 1988, Bulletin of the Australian Mathematical Society.
[36] Jürgen Teich,et al. Power Signature Watermarking of IP Cores for FPGAs , 2008, J. Signal Process. Syst..
[37] Jean-Louis Lanet,et al. Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings , 2010, CARDIS.
[38] Ingrid Verbauwhede,et al. Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007, CHES.
[39] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[40] Amr T. Abdel-Hamid,et al. A Survey on IP Watermarking Techniques , 2004, Des. Autom. Embed. Syst..
[41] Boris Skoric,et al. Read-Proof Hardware from Protective Coatings , 2006, CHES.
[42] Ginger Myles. Using software watermarking to discourage piracy , 2005, CROS.