Multiple Observations for Secret-Key Binding with SRAM PUFs
暂无分享,去创建一个
[1] Dennis Hui,et al. Channel Coding in 5G New Radio: A Tutorial Overview and Performance Comparison with 4G LTE , 2018, IEEE Vehicular Technology Magazine.
[2] Stefan Katzenbeisser,et al. PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon , 2012, CHES.
[3] Yang Su,et al. Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses , 2019, IEEE Transactions on Information Forensics and Security.
[4] Roel Maes,et al. An Accurate Probabilistic Reliability Model for Silicon PUFs , 2013, CHES.
[5] Boris Skoric,et al. Bias-based modeling and entropy analysis of PUFs , 2013, TrustED '13.
[6] Srinivas Devadas,et al. Secure and robust error correction for physical unclonable functions , 2010, IEEE Design & Test of Computers.
[7] Lieneke Kusters,et al. Security of helper data schemes for SRAM-PUF in multiple enrollment scenarios , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[8] Lieneke Kusters,et al. Secret-Key Capacity Regions for Multiple Enrollments With an SRAM-PUF , 2019, IEEE Transactions on Information Forensics and Security.
[9] Onur Günlü,et al. Privacy, Secrecy, and Storage With Multiple Noisy Measurements of Identifiers , 2016, IEEE Transactions on Information Forensics and Security.
[10] Thomas M. Cover,et al. Network Information Theory , 2001 .
[11] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[12] Xavier Boyen,et al. Reusable cryptographic fuzzy extractors , 2004, CCS '04.
[13] Matthias Hiller,et al. Cherry-Picking Reliable PUF Bits With Differential Sequence Coding , 2016, IEEE Transactions on Information Forensics and Security.
[14] Stefan Katzenbeisser,et al. Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs , 2012, Financial Cryptography.
[15] Matthias Hiller,et al. Complementary IBS: Application specific error correction for PUFs , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.
[16] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.
[17] Ingrid Verbauwhede,et al. Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs , 2009, CHES.
[18] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[19] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[20] Lieneke Kusters,et al. Modeling Temperature Behavior in the Helper Data for Secret-Key Binding with SRAM PUFs , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).
[21] Ingrid Verbauwhede,et al. A soft decision helper data algorithm for SRAM PUFs , 2009, 2009 IEEE International Symposium on Information Theory.
[22] Onur Gunlu,et al. Multi-Entity and Multi-Enrollment Key Agreement With Correlated Noise , 2020, IEEE Transactions on Information Forensics and Security.
[23] Tanya Ignatenko,et al. Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-method , 2016 .
[24] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[25] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[26] R. Pappu,et al. Physical One-Way Functions , 2002, Science.