Securing FPGA SoC configurations independent of their manufacturers
暂无分享,去创建一个
Georg Sigl | Johann Heyszl | Florian Wilde | Michael Pehl | Nisha Jacob | Robert Hesselbarth | Kai Fischer | Jakob Wittmann
[1] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[2] Georg Sigl,et al. Protecting PUF Error Correction by Codeword Masking , 2013, IACR Cryptol. ePrint Arch..
[3] Christof Paar,et al. Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs , 2015, TRETS.
[4] Dawu Gu,et al. Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[5] Robert Hesselbarth,et al. Evaluation of Bistable Ring PUFs Using Single Layer Neural Networks , 2014, TRUST.
[6] Tim Güneysu,et al. Security analysis of index-based syndrome coding for PUF-based key generation , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[8] Sergei Skorobogatov,et al. Breakthrough Silicon Scanning Discovers Backdoor in Military Chip , 2012, CHES.
[9] Matthias Hiller,et al. Seesaw: An Area-Optimized FPGA Viterbi Decoder for PUFs , 2014, 2014 17th Euromicro Conference on Digital System Design.
[10] Georg Sigl,et al. Fast and Reliable PUF Response Evaluation from Unsettled Bistable Rings , 2016, 2016 Euromicro Conference on Digital System Design (DSD).
[11] Matthias Hiller,et al. Cherry-Picking Reliable PUF Bits With Differential Sequence Coding , 2016, IEEE Transactions on Information Forensics and Security.
[12] Amir Moradi,et al. Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series , 2016, COSADE.
[13] Matthias Hiller,et al. A systematic study of lightweight hash functions on FPGAs , 2014, 2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig14).
[14] Ingrid Verbauwhede,et al. PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator , 2012, CHES.
[15] Sergei Skorobogatov,et al. In the blink of an eye: There goes your AES key , 2012, IACR Cryptol. ePrint Arch..
[16] Christof Paar,et al. Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering , 2013, FPGA '13.
[17] Ulrich Rührmair,et al. The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[18] Alessandro Barenghi,et al. On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs , 2011, CCS '11.
[19] Michael Weiner,et al. Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes , 2013, TrustED '13.