Secret Sharing Schemes Based Secure Authentication for Physical Unclonable Function
暂无分享,去创建一个
[1] Magdy A. Bayoumi,et al. A PUF-based paradigm for IoT security , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).
[2] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[3] Mitsugu Iwamoto,et al. A new mode of operation for arbiter PUF to improve uniqueness on FPGA , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[4] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Srinivas Devadas,et al. PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.
[7] Miodrag Potkonjak,et al. Lightweight secure PUFs , 2008, ICCAD 2008.
[8] Biplab Sikdar,et al. Mutual Authentication in IoT Systems Using Physical Unclonable Functions , 2017, IEEE Internet of Things Journal.
[9] Sasan Khoshroo. Design and Evaluation of FPGA-based Hybrid Physically Unclonable Functions , 2013 .
[10] An Braeken,et al. PUF Based Authentication Protocol for IoT , 2018, Symmetry.
[11] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[12] Toshiaki Tanaka,et al. On a Fast (k, n)-Threshold Secret Sharing Scheme , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..