메뉴 건너뛰기




Volumn , Issue , 2008, Pages 58-64

Design and implementation of PUF-based "unclonable" RFID ICs for anti-counterfeiting and security applications

Author keywords

[No Author keywords available]

Indexed keywords

ANTI-COUNTERFEITING; EXTENSIVE TESTING; FREQUENCY IDENTIFICATION; IC MANUFACTURING; INTERNATIONAL CONFERENCES; LOW COSTS; PHYSICAL CHARACTERISTICS; PHYSICAL UNCLONABLE FUNCTIONS; SECURITY APPLICATIONS; SILICON CHIPS;

EID: 49049105769     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RFID.2008.4519377     Document Type: Conference Paper
Times cited : (309)

References (11)
  • 2
    • 35048859848 scopus 로고    scopus 로고
    • Strong Authentication for RFID Systems Using the AES Algorithm
    • Proc. Workshop on Cryptographic Hardware and Embedded Systems CHES
    • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm, Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer LNCS 3156, pp. 357-370, 2004.
    • (2004) Springer LNCS , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 6
    • 49049086674 scopus 로고    scopus 로고
    • M. Lehtonen, T. Staake, F. Michahelles and E. Fleisch, From Identification to Authentication - A Review of RFID Product Authentication Techniques. RFIDSec 2006.
    • M. Lehtonen, T. Staake, F. Michahelles and E. Fleisch, From Identification to Authentication - A Review of RFID Product Authentication Techniques. RFIDSec 2006.
  • 8
    • 3242749566 scopus 로고    scopus 로고
    • PhD thesis, Massachusetts Institute of Technology
    • R. Pappu. Physical One-Way Functions. PhD thesis, Massachusetts Institute of Technology, 2001.
    • (2001) Physical One-Way Functions
    • Pappu, R.1
  • 9
    • 26444544536 scopus 로고    scopus 로고
    • Robust key extraction from physical unclonable functions
    • Proceedings of the Applied Cryptography and Network Security Conference, of
    • B. Skoric, P. Tuyls, and W. Ophey. Robust key extraction from physical unclonable functions. In Proceedings of the Applied Cryptography and Network Security Conference 2005, volume 3531 of Lecture Notes in Computer Science, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3531
    • Skoric, B.1    Tuyls, P.2    Ophey, W.3
  • 10
    • 33745654539 scopus 로고    scopus 로고
    • RFID-Tags for Anticounterfeiting
    • Topics in Cryptology, CT-RSA, of
    • P. Tuyls and L. Batina. RFID-Tags for Anticounterfeiting. Topics in Cryptology - CT-RSA 2006. Volume 3860 of Lecture Notes in Computer Science, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3860
    • Tuyls, P.1    Batina, L.2
  • 11
    • 26444487655 scopus 로고    scopus 로고
    • Information theoretical security analysis of physical unclonable functions
    • Proceedings of Conference on Financial Cryptography and Data Security, of
    • P. Tuyls, B. Skoric, S. Stallinga, A. Akkermans, and W. Ophey. Information theoretical security analysis of physical unclonable functions. In Proceedings of Conference on Financial Cryptography and Data Security 2005, volume 3570 of Lecture Notes in Computer Science, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3570
    • Tuyls, P.1    Skoric, B.2    Stallinga, S.3    Akkermans, A.4    Ophey, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.