Lattice Basis Reduction Attack against Physically Unclonable Functions
暂无分享,去创建一个
Jean-Pierre Seifert | Shahin Tajik | Fatemeh Ganji | Juliane Krämer | F. Ganji | Juliane Krämer | Jean-Pierre Seifert | Shahin Tajik
[1] Claus-Peter Schnorr,et al. Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction , 2012, IACR Cryptol. ePrint Arch..
[2] R. Pappu,et al. Physical One-Way Functions , 2002, Science.
[3] Ingrid Verbauwhede,et al. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions , 2010, Towards Hardware-Intrinsic Security.
[4] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[5] C. P. Schnorr,et al. A Hierarchy of Polynomial Time Lattice Basis Reduction Algorithms , 1987, Theor. Comput. Sci..
[6] Antoine Joux,et al. Improved low-density subset sum algorithms , 1992, computational complexity.
[7] C. A. Rogers,et al. An Introduction to the Geometry of Numbers , 1959 .
[8] Georg T. Becker,et al. Active and Passive Side-Channel Attacks on Delay Based PUF Designs , 2014, IACR Cryptol. ePrint Arch..
[9] Ulrich Rührmair,et al. Strong PUFs: Models, Constructions, and Security Proofs , 2010, Towards Hardware-Intrinsic Security.
[10] Ieee Circuits,et al. Digest of technical papers , 1984 .
[11] MahmoudAhmed,et al. PUF Modeling Attacks on Simulated and Silicon Data , 2013 .
[12] Jean-Pierre Seifert,et al. Cloning Physically Unclonable Functions , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[13] Frederik Armknecht,et al. A Formalization of the Security Features of Physical Functions , 2011, 2011 IEEE Symposium on Security and Privacy.
[14] Roel Maes,et al. Physically Unclonable Functions , 2013, Springer Berlin Heidelberg.
[15] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[16] Ramarathnam Venkatesan,et al. Speeding up Discrete Log and Factoring Based Schemes via Precomputations , 1998, EUROCRYPT.
[17] Jean-Pierre Seifert,et al. Emission Analysis of Hardware Implementations , 2014, 2014 17th Euromicro Conference on Digital System Design.
[18] Arenberg Doctoral,et al. Physically Unclonable Functions: Constructions, Properties and Applications , 2012 .
[19] Jeroen Delvaux,et al. Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible II , 2014, IACR Cryptol. ePrint Arch..
[20] Srinivas Devadas,et al. FPGA PUF using programmable delay lines , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[21] Jacques Stern,et al. The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications , 1999, CRYPTO.
[22] Jan Sölter,et al. Efficient Power and Timing Side Channels for Physical Unclonable Functions , 2014, CHES.
[23] Srinivas Devadas,et al. Controlled physical random functions , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[24] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[25] Jean-Pierre Seifert,et al. Physical Characterization of Arbiter PUFs , 2014, IACR Cryptol. ePrint Arch..
[26] Phong Q. Nguyen,et al. BKZ 2.0: Better Lattice Security Estimates , 2011, ASIACRYPT.
[27] Ahmad-Reza Sadeghi,et al. Recyclable PUFs: logically reconfigurable PUFs , 2011, Journal of Cryptographic Engineering.
[28] Jean-Pierre Seifert,et al. Breaking and entering through the silicon , 2013, CCS.
[29] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[30] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[31] Srinivas Devadas,et al. PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.
[32] Srinivas Devadas,et al. Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[33] Frank Sehnke,et al. On the Foundations of Physical Unclonable Functions , 2009, IACR Cryptol. ePrint Arch..
[34] John J. Cannon,et al. The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..
[35] Georg T. Becker,et al. On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation , 2015, RFIDSec.
[36] Claus-Peter Schnorr,et al. Accelerated Slide- and LLL-Reduction , 2011, Electron. Colloquium Comput. Complex..
[37] Phong Q. Nguyen,et al. The LLL Algorithm - Survey and Applications , 2009, Information Security and Cryptography.
[38] J. Martinet. Perfect Lattices in Euclidean Spaces , 2010 .
[39] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).