Secure remote sensing and communication using digital PUFs
暂无分享,去创建一个
[1] Miodrag Potkonjak,et al. Digital bimodal function: An ultra-low energy security primitive , 2013, International Symposium on Low Power Electronics and Design (ISLPED).
[2] Miodrag Potkonjak,et al. Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions , 2009, Information Hiding.
[3] Patrick Schaumont,et al. Offline Hardware/Software Authentication for Reconfigurable Platforms , 2006, CHES.
[4] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).
[5] David Bryan,et al. Combinational profiles of sequential benchmark circuits , 1989, IEEE International Symposium on Circuits and Systems,.
[6] Miodrag Potkonjak,et al. Nanotechnology-based trusted remote sensing , 2011, 2011 IEEE SENSORS Proceedings.
[7] Miodrag Potkonjak,et al. Trusted sensors and remote sensing , 2010, 2010 IEEE Sensors.
[8] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[9] References , 1971 .
[10] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[11] Ulrich Rührmair,et al. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information? , 2011, SOFSEM.
[12] Wayne P. Burleson,et al. Hybrid side-channel/machine-learning attacks on PUFs: A new threat? , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[13] Ryan Kastner,et al. A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors , 2012, Cryptography and Security.
[14] Farinaz Koushanfar,et al. Active Hardware Metering for Intellectual Property Protection and Security , 2007, USENIX Security Symposium.
[15] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[16] David Naccache,et al. 3D Hardware Canaries , 2012, CHES.
[17] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[18] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[19] Wael Adi,et al. Construction of Software-Based Digital Physical Clone Resistant Functions , 2013, 2013 Fourth International Conference on Emerging Security Technologies.
[20] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[21] Miodrag Potkonjak,et al. Techniques for Design and Implementation of Secure Reconfigurable PUFs , 2009, TRETS.
[22] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[23] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[24] S. Devadas,et al. Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.
[25] Vinod Vaikuntanathan,et al. Inspection resistant memory: Architectural support for security from physical examination , 2012, 2012 39th Annual International Symposium on Computer Architecture (ISCA).
[26] Jean-Pierre Seifert,et al. Cloning Physically Unclonable Functions , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[27] G. Edward Suh,et al. Design and implementation of the AEGIS single-chip secure processor using physical random functions , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[28] Ryan Kastner,et al. Hardware trust implications of 3-D integration , 2010, WESS '10.
[29] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[30] Kevin Skadron,et al. HotSpot: a compact thermal modeling methodology for early-stage VLSI design , 2006, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[31] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[32] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[33] Sung Kyu Lim,et al. A study of Through-Silicon-Via impact on the 3D stacked IC layout , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.