Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function
暂无分享,去创建一个
Qiang Zhou | Zhihua Xia | Xingming Sun | Qiang Wu | Yong-Qiang Lv | Jiliang Zhang | Xingwei Wang | Yipeng Ding | Qiang Zhou | Jiliang Zhang | Qiang Wu | Xingming Sun | Zhihua Xia | Y. Ding | Xingwei Wang | Yong-Qiang Lv
[1] Ingrid Verbauwhede,et al. A Pay-per-Use Licensing Scheme for Hardware IP Cores in Recent SRAM-Based FPGAs , 2012, IEEE Transactions on Information Forensics and Security.
[2] Yongqiang Lyu,et al. A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing , 2015, IEEE Transactions on Information Forensics and Security.
[3] Gang Qu,et al. Reconfigurable Binding against FPGA Replay Attacks , 2015, TODE.
[4] Miodrag Potkonjak,et al. Techniques for Design and Implementation of Secure Reconfigurable PUFs , 2009, TRETS.
[5] Jorge Guajardo,et al. Extended abstract: The butterfly PUF protecting IP on every FPGA , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[6] Phillip H. Jones,et al. Design and evaluation of a delay-based FPGA Physically Unclonable Function , 2012, 2012 IEEE 30th International Conference on Computer Design (ICCD).
[7] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[8] Chi-En Daniel Yin,et al. Design and implementation of a group-based RO PUF , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[9] Jin Wang,et al. Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .
[10] Qian Wang,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[11] Patrick Schaumont,et al. An Analysis of Delay Based PUF Implementations on FPGA , 2010, ARC.
[12] Jorge Guajardo,et al. Physical Unclonable Functions and Their Applications to Vehicle System Security , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[13] Qiang Wu,et al. Research on Design Method of Dynamic Partial Reconfigurable System , 2012 .
[14] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[15] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[16] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[17] Jason Helge Anderson,et al. A PUF design for secure FPGA-based embedded systems , 2010, 2010 15th Asia and South Pacific Design Automation Conference (ASP-DAC).
[18] Miodrag Potkonjak,et al. Testing Techniques for Hardware Security , 2008, 2008 IEEE International Test Conference.
[19] Abhranil Maiti,et al. Improved Ring Oscillator PUF: An FPGA-friendly Secure Primitive , 2011, Journal of Cryptology.
[20] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[21] Yongqiang Lyu,et al. Efficient verification of IP watermarks in FPGA designs through lookup table content extracting , 2012, IEICE Electron. Express.
[22] Yongqiang Lyu,et al. FPGA IP protection by binding Finite State Machine to Physical Unclonable Function , 2013, 2013 23rd International Conference on Field programmable Logic and Applications.
[23] Srinivas Devadas,et al. Secure and robust error correction for physical unclonable functions , 2010, IEEE Design & Test of Computers.
[24] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[25] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[26] Qiang Zhou,et al. A Survey on Silicon PUFs and Recent Advances in Ring Oscillator PUFs , 2014, Journal of Computer Science and Technology.
[27] Jin Wang,et al. A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks , 2014 .
[28] Yaping Lin,et al. Watermarking FPGA Bitfile for Intellectual Property Protection , 2012 .
[29] Ingrid Verbauwhede,et al. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions , 2010, Towards Hardware-Intrinsic Security.
[30] Srinivas Devadas,et al. Reliable and efficient PUF-based key generation using pattern matching , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[31] Farinaz Koushanfar,et al. Active control and digital rights management of integrated circuit IP cores , 2008, CASES '08.
[32] Zhihua Xia,et al. Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.
[33] Farinaz Koushanfar,et al. Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management , 2012, IEEE Transactions on Information Forensics and Security.
[34] Tom Kean,et al. Cryptographic rights management of FPGA intellectual property cores , 2002, FPGA '02.
[35] Berk Sunar,et al. CDs Have Fingerprints Too , 2009, CHES.
[36] Stefan Katzenbeisser,et al. Recyclable PUFs: Logically Reconfigurable PUFs , 2011, CHES.