Construction of Software-Based Digital Physical Clone Resistant Functions
暂无分享,去创建一个
[1] Stefan Katzenbeisser,et al. Recyclable PUFs: Logically Reconfigurable PUFs , 2011, CHES.
[2] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[3] Wael Adi,et al. Deploying FPGA self-configurable cell structure for micro crypto-functions , 2009, 2009 IEEE Symposium on Computers and Communications.
[4] Bruce Schneier,et al. Unbalanced Feistel Networks and Block Cipher Design , 1996, FSE.
[5] Marc F. Witteman,et al. Reverse Engineering Java Card Applets Using Power Analysis , 2007, WISTP.
[6] Christophe Clavier. An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm , 2007, ICISS.
[7] Roman Novak,et al. Side-Channel Based Reverse Engineering of Secret Algorithms , 2003 .
[8] Benoit Feix,et al. Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms , 2007, Selected Areas in Cryptography.
[9] Denis Réal,et al. Defeating Any Secret Cryptography with SCARE Attacks , 2010, LATINCRYPT.
[10] Boris Skoric,et al. Read-Proof Hardware from Protective Coatings , 2006, CHES.
[11] Wael Adi,et al. Combined HW-SW adaptive clone-resistant functions as physical security anchors , 2013, 2013 NASA/ESA Conference on Adaptive Hardware and Systems (AHS-2013).
[12] Jacques Patarin. Luby-rackoff: 7 rounds are enough for 2n(1-ε) security , 2003 .
[13] Frédéric Valette,et al. SCARE of the DES , 2005, ACNS.
[14] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[15] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[16] Jacques Patarin,et al. Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security , 2003, CRYPTO.
[17] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[18] Jean-Jacques Quisquater,et al. Automatic Code Recognition for Smartcards Using a Kohonen Neural Network , 2002, CARDIS.
[19] Christof Paar,et al. Building a Side Channel Based Disassembler , 2010, Trans. Comput. Sci..
[20] Markku-Juhani O. Saarinen. Cryptographic Analysis of All 4 x 4 - Bit S-Boxes , 2011, IACR Cryptol. ePrint Arch..
[21] Blaise L. P. Gassend,et al. Physical random functions , 2003 .
[22] Kyoji Shibutani,et al. Generalized Feistel networks revisited , 2012, Designs, Codes and Cryptography.
[23] Zheng Gong,et al. On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs , 2011, ISPEC.