Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks
暂无分享,去创建一个
[1] Moti Yung,et al. Towards Hardware-Intrinsic Security , 2010 .
[2] Boris Skoric,et al. Information-Theoretic Security Analysis of Physical Uncloneable Functions , 2005, Financial Cryptography.
[3] Boris Skoric,et al. Read-Proof Hardware from Protective Coatings , 2006, CHES.
[4] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[5] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[6] Boris Skoric,et al. Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks , 2013, IACR Cryptol. ePrint Arch..
[7] S. A. Goorden,et al. Quantum-Secure Authentication with a Classical Key , 2013, 1303.0142.
[8] Boris Skoric. On the entropy of keys derived from laser speckle; statistical properties of Gabor-transformed speckle , 2008 .
[9] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[10] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[11] C. Macchiavello,et al. Optimal state estimation for d-dimensional quantum systems☆ , 1998, quant-ph/9812016.
[12] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[13] D. Dieks. Communication by EPR devices , 1982 .
[14] Boris Skoric,et al. Randomized resonators as uniquely identifiable anti-counterfeiting tags , 2008 .
[15] Boris Skoric,et al. Quantum-secure authentication of a physical unclonable key , 2014, CLEO 2015.
[16] Boris Skoric,et al. Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method , 2006, 2006 IEEE International Symposium on Information Theory.
[17] Gang Xiong,et al. Forgery: ‘Fingerprinting’ documents and packaging , 2005, Nature.
[18] R. Pappu,et al. Physical One-Way Functions , 2002, Science.
[19] Boris Skoric,et al. Quantum Readout of Physical Unclonable Functions , 2010, AFRICACRYPT.