메뉴 건너뛰기




Volumn 10, Issue 4, 2008, Pages

Controlled physical random functions and applications

Author keywords

Certified execution; Physical random function; Physical security; Physical unclonable function; Trusted computing

Indexed keywords

CERTIFIED EXECUTION; CONSUMER DEVICES; CONTROLLED PHYSICAL RANDOM FUNCTIONS (CPUFS); PHYSICAL SECURITY; PHYSICAL UNCLONABLE FUNCTION; TRUSTED COMPUTING;

EID: 39149145168     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1284680.1284683     Document Type: Article
Times cited : (112)

References (34)
  • 3
    • 0000694402 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • IWSP: International Workshop on Security Protocols, Springer-Verlag, New York
    • ANDERSON, R. AND KUHN, M. 1997. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols, LNCS. Springer-Verlag, New York.
    • (1997) LNCS
    • ANDERSON, R.1    KUHN, M.2
  • 7
    • 39149128503 scopus 로고    scopus 로고
    • DISTRIBUTED.NET. http://distributed.nat/.
    • DISTRIBUTED.NET. http://distributed.nat/.
  • 8
    • 4344584084 scopus 로고    scopus 로고
    • M.S. thesis, Massachusetts Institute of Technology
    • GASSEND, B. 2003. Physical Random Functions. M.S. thesis, Massachusetts Institute of Technology.
    • (2003) Physical Random Functions
    • GASSEND, B.1
  • 13
    • 0004610703 scopus 로고    scopus 로고
    • Secure deletion of data from magnetic and solid-state memory
    • Usenix Association, Berkeley, CA
    • GUTMAN, P. 1996. Secure deletion of data from magnetic and solid-state memory. In Sixth USENIX Security Symposium Proceedings. Usenix Association, Berkeley, CA, 77-89.
    • (1996) Sixth USENIX Security Symposium Proceedings , pp. 77-89
    • GUTMAN, P.1
  • 15
    • 0038507387 scopus 로고    scopus 로고
    • Alloy: A lightweight object modelling notation
    • JACKSON, D. 2002. Alloy: A lightweight object modelling notation. ACM TOSEM 11, 2, 256-290.
    • (2002) ACM TOSEM , vol.11 , Issue.2 , pp. 256-290
    • JACKSON, D.1
  • 22
    • 39149127481 scopus 로고    scopus 로고
    • MICROSOFT. Next-Generation Secure Computing Base, http://www.microsoft.com/resources/ngscb/defaul.mspx.
    • MICROSOFT. Next-Generation Secure Computing Base, http://www.microsoft.com/resources/ngscb/defaul.mspx.
  • 23
    • 0037952426 scopus 로고    scopus 로고
    • Ph.D. thesis, Massachusetts Institute of Technology
    • RAVIKANTH, R S. 2001. Physical one-way functions. Ph.D. thesis, Massachusetts Institute of Technology.
    • (2001) Physical one-way functions
    • RAVIKANTH, R.S.1
  • 25
    • 39149104891 scopus 로고    scopus 로고
    • SETI@HOME
    • SETI@HOME.
  • 26
    • 26444544536 scopus 로고    scopus 로고
    • Robust key extraction from physical unclonable functions
    • Proceedings of the Applied Cryptography and Network Security Conference 2005, J. Ionnidis, A. Keromytis, and M. Yung, Eds, Springer-Verlag. New York
    • SKORIC, B., TUYLS, P., AND OPHEY, W 2005. Robust key extraction from physical unclonable functions. In Proceedings of the Applied Cryptography and Network Security Conference 2005, J. Ionnidis, A. Keromytis, and M. Yung, Eds. Lecture Notes in Computer Science, vol. 3531. Springer-Verlag. New York. 407-422.
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 407-422
    • SKORIC, B.1    TUYLS, P.2    OPHEY, W.3
  • 27
    • 0033293553 scopus 로고    scopus 로고
    • SMITH, S. W AND WEINGART, S. H. 1999. Building a high-performance, programmable secure coprocessor. Computer Networks (Special Issue on Computer Network Security) 31, 8 (Apr.), 831-860.
    • SMITH, S. W AND WEINGART, S. H. 1999. Building a high-performance, programmable secure coprocessor. Computer Networks (Special Issue on Computer Network Security) 31, 8 (Apr.), 831-860.
  • 31
    • 21644486314 scopus 로고    scopus 로고
    • TRUSTED COMPUTING GROUP, Revision 1.2
    • TRUSTED COMPUTING GROUP. 2004. TCG Specification Architecture Overview Revision 1.2. http://www. trustedcomputinggroup.com/home.
    • (2004) TCG Specification Architecture Overview
  • 32
    • 26444487655 scopus 로고    scopus 로고
    • Information theoretical security analysis of physical unclonable functions
    • Proceedings Conf on Financial Cryptography and Data Security 2005, A. Patrick and M. Yung, Eds, Springer-Verlag, New York
    • TUYLS, P., SKORIC, B., STALLINGA, S., AKKERMANS, A., AND OPHEY, W. 2005. Information theoretical security analysis of physical unclonable functions. In Proceedings Conf on Financial Cryptography and Data Security 2005, A. Patrick and M. Yung, Eds. Lecture Notes in Computer Science, vol. 3570. Springer-Verlag, New York. 141-155.
    • (2005) Lecture Notes in Computer Science , vol.3570 , pp. 141-155
    • TUYLS, P.1    SKORIC, B.2    STALLINGA, S.3    AKKERMANS, A.4    OPHEY, W.5
  • 34
    • 0004196480 scopus 로고
    • Ph.D. thesis, Carnegie Mellon University
    • YEE, B. S. 1994. Using secure coprocessors. Ph.D. thesis, Carnegie Mellon University.
    • (1994) Using secure coprocessors
    • YEE, B.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.