Physical Unclonable Functions and Applications: A Tutorial
暂无分享,去创建一个
Srinivas Devadas | Meng-Day Yu | Farinaz Koushanfar | Charles Herder | F. Koushanfar | S. Devadas | Charles Herder | M. Yu
[1] Srinivas Devadas,et al. Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching , 2014, IEEE Transactions on Emerging Topics in Computing.
[2] Farinaz Koushanfar,et al. FPGA Time-Bounded Unclonable Authentication , 2010, Information Hiding.
[3] Srinivas Devadas,et al. Secure and robust error correction for physical unclonable functions , 2010, IEEE Design & Test of Computers.
[4] Ulrich Rührmair,et al. SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions , 2009, IACR Cryptol. ePrint Arch..
[5] Sidney N. Graybeal,et al. Getting Out of the Starting Block , 1989 .
[6] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[7] Simon W. Moore,et al. The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators , 2009, CHES.
[8] Ahmad-Reza Sadeghi,et al. On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs , 2013, CHES.
[9] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).
[10] 北郷 明成,et al. University of California, Los Angeles (UCLA) , 2011, The Grants Register 2019.
[11] Miodrag Potkonjak,et al. Techniques for Design and Implementation of Secure Reconfigurable PUFs , 2009, TRETS.
[12] Ingrid Verbauwhede,et al. Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs , 2009, CHES.
[13] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.
[14] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[15] S. Devadas,et al. Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.
[16] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[17] Miodrag Potkonjak,et al. Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions , 2009, Information Hiding.
[18] Yevgeniy Dodis,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.
[19] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[20] Farinaz Koushanfar,et al. Time-Bounded Authentication of FPGAs , 2011, IEEE Transactions on Information Forensics and Security.
[21] Miodrag Potkonjak,et al. Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[22] Ahmad-Reza Sadeghi,et al. PUFatt: Embedded platform attestation based on novel processor-based PUFs , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[23] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[24] Jean-Pierre Seifert,et al. Cloning Physically Unclonable Functions , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[25] Jan Sölter,et al. Power and Timing Side Channels for PUFs and their Efficient Exploitation , 2013, IACR Cryptol. ePrint Arch..
[26] Ulrich Rührmair,et al. Combined Modeling and Side Channel Attacks on Strong PUFs , 2013, IACR Cryptol. ePrint Arch..
[27] Georg Sigl,et al. Semi-invasive EM attack on FPGA RO PUFs and countermeasures , 2011 .
[28] R. Pappu,et al. Physical One-Way Functions , 2002, Science.
[29] Srinivas Devadas,et al. Reliable and efficient PUF-based key generation using pattern matching , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[30] Srinivas Devadas,et al. Security Based on Physical Unclonability and Disorder , 2012 .
[31] Srinivas Devadas,et al. Identification and authentication of integrated circuits , 2004, Concurr. Pract. Exp..
[32] Srinivas Devadas,et al. Lightweight and Secure PUF Key Storage Using Limits of Machine Learning , 2011, CHES.
[33] Srinivas Devadas,et al. Performance metrics and empirical results of a PUF cryptographic key generation ASIC , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.
[34] G. Edward Suh,et al. Aegis: A Single-Chip Secure Processor , 2007, IEEE Design & Test of Computers.
[35] Miodrag Potkonjak,et al. Lightweight secure PUFs , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[36] Daniel E. Holcomb,et al. Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags , 2007 .
[37] 斯里尼瓦斯·德瓦达斯. Non-networked rfid-puf authentication , 2009 .
[38] Darko Kirovski. Anti-counterfeiting: Mixing the Physical and the Digital World , 2010, Towards Hardware-Intrinsic Security.
[39] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[40] Srinivas Devadas,et al. Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[41] B. Frieden,et al. Laser speckle and related phenomena , 1984, IEEE Journal of Quantum Electronics.
[42] Blaise L. P. Gassend,et al. Physical random functions , 2003 .
[43] Miodrag Potkonjak,et al. Testing Techniques for Hardware Security , 2008, 2008 IEEE International Test Conference.