-
1
-
-
0037144430
-
Physical one-way functions
-
Pappu, R.S., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(6), 2026-2030 (2002)
-
(2002)
Science
, vol.297
, Issue.6
, pp. 2026-2030
-
-
Pappu, R.S.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
2
-
-
33750726983
-
-
Tuyls, P., Schrijen, G.-J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.:: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 369-383. Springer, Heidelberg (2006)
-
Tuyls, P., Schrijen, G.-J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.:: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
-
-
-
-
3
-
-
84870642654
-
TPM main specification
-
Trusted Computing Group:, Technical Report Version 1.2 Revision 94 March
-
Trusted Computing Group: TPM main specification. Technical Report Version 1.2 Revision 94 (March 2006)
-
(2006)
-
-
-
4
-
-
0038341105
-
Silicon physical unknown functions
-
Atluri, V, ed, ACM, New York
-
Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Silicon physical unknown functions. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security - CCS 2002, pp. 148-160. ACM, New York (2002)
-
(2002)
ACM Conference on Computer and Communications Security
, vol.CCS 2002
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.E.2
van Dijk, M.3
Devadas, S.4
-
5
-
-
38049015807
-
-
Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, 4727, pp. 63-80. Springer, Heidelberg (2007)
-
Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
-
-
-
-
6
-
-
51049115248
-
Randomized resonators as uniquely identifiable anti-counterfeiting tags
-
Technical report, Philips Research Laboratories January 28
-
Škorić, B., Bel, T., Blom, A., de Jong, B., Kretschman, H., Nellissen, A.: Randomized resonators as uniquely identifiable anti-counterfeiting tags. Technical report, Philips Research Laboratories (January 28, 2008)
-
(2008)
-
-
Škorić, B.1
Bel, T.2
Blom, A.3
de Jong, B.4
Kretschman, H.5
Nellissen, A.6
-
8
-
-
33750702480
-
-
Simpson, E., Schaumont, P.: Offline Hardware/Software Authentication for Reconfigurable Platforms. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 311-323. Springer, Heidelberg (2006)
-
Simpson, E., Schaumont, P.: Offline Hardware/Software Authentication for Reconfigurable Platforms. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 311-323. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
48149093328
-
Physical Unclonable Functions and Public Key Crypto for FPGA IP Protection
-
August 27-30, IEEE, Los Alamitos () 2007
-
Guajardo, J., Kumar, S.S., Schrijen, G. J., Tuyls, P.: Physical Unclonable Functions and Public Key Crypto for FPGA IP Protection. In: International Conference on Field Programmable Logic and Applications - FPL 2007, August 27-30, 2007, pp. 189-195. IEEE, Los Alamitos (2007)
-
(2007)
International Conference on Field Programmable Logic and Applications - FPL
, pp. 189-195
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
10
-
-
35248839355
-
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometrie Templates
-
Kittler, J, Nixon, M.S, eds, AVBPA 2003, Springer, Heidelberg
-
Linnartz, J.P.M.G., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometrie Templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393-402. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2688
, pp. 393-402
-
-
Linnartz, J.P.M.G.1
Tuyls, P.2
-
11
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Cachin, C, Camenisch, J.L, eds, EU-RCCRYPT 2004, Springer, Heidelberg
-
Dodis, Y., Reyzin, M., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EU-RCCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, M.2
Smith, A.3
-
12
-
-
37149044968
-
-
Suh, G.E., O'Donnell, C.W., Devadas, S.: AEGIS: A Single-Chip Secure Processor. IEEE Design & Test of Computers 24(6), 570-580 (2007)
-
Suh, G.E., O'Donnell, C.W., Devadas, S.: AEGIS: A Single-Chip Secure Processor. IEEE Design & Test of Computers 24(6), 570-580 (2007)
-
-
-
-
13
-
-
51049102686
-
-
Dijk, M.v., Lim, D., Devadas, S.: Reliable Secret Sharing With Physical R.andom Functions. Computation Structures Group Memo 475, CSAIL - Massachusetts Institute of Technology (2004)
-
Dijk, M.v., Lim, D., Devadas, S.: Reliable Secret Sharing With Physical R.andom Functions. Computation Structures Group Memo 475, CSAIL - Massachusetts Institute of Technology (2004)
-
-
-
-
14
-
-
4344584084
-
-
Master's thesis, Computer Science and Artificial Intelligence Laboratory, MIT Computation Structures Group Memo, February
-
Gassend, B.: Physical Random Functions. Master's thesis, Computer Science and Artificial Intelligence Laboratory, MIT Computation Structures Group Memo 458 (February 2003)
-
(2003)
Physical Random Functions
, pp. 458
-
-
Gassend, B.1
-
15
-
-
0033281339
-
A Fuzzy Commitment Scheme
-
Motiwalla, J, Tsudik, G, eds, November 1-4, ACM, New York () 1999
-
Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Motiwalla, J., Tsudik, G. (eds.) ACM Conference on Computer and Communications Security - ACM CCS 1999, November 1-4, 1999, pp. 28-36. ACM, New York (1999)
-
(1999)
ACM Conference on Computer and Communications Security - ACM CCS
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
16
-
-
33747624401
-
Combining Crypto with Biometrics Effectively
-
Hao, F., Anderson, R., Daugman, J.: Combining Crypto with Biometrics Effectively. IEEE Transactions on Computers 55(9), 1081-1088 (2006)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
17
-
-
0000292532
-
Codes Correcteurs D'erreurs.
-
Hochquenghem, A.: Codes Correcteurs D'erreurs. Chiffres 2, 147-156 (1959)
-
(1959)
Chiffres
, vol.2
, pp. 147-156
-
-
Hochquenghem, A.1
-
19
-
-
0003367131
-
Concatenated Codes
-
MIT Press, Cambridge
-
Forney Jr., G.D.: Concatenated Codes. Research Monograph No. 37. MIT Press, Cambridge (1966)
-
(1966)
Research Monograph
, vol.37
-
-
Forney Jr., G.D.1
-
22
-
-
0018456171
-
Universal Classes of Hash Functions
-
Carter, L., Wegman, M.N.: Universal Classes of Hash Functions. J. Comput. Syst. Sci. 18(2), 143-154 (1979)
-
(1979)
J. Comput. Syst. Sci
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, L.1
Wegman, M.N.2
-
23
-
-
51049092411
-
Fourth Quarter 2007
-
Technical Report UG116 v4.3, February 6
-
Xilinx: Device Reliability Report -Fourth Quarter 2007. Technical Report UG116 (v4.3) (February 6, 2008), http://www.xilinx.com/support/documentation/
-
(2008)
Device Reliability Report
-
-
-
24
-
-
51049083272
-
Reliability Report 45 - Q2 2007
-
Technical report
-
Altera: Reliability Report 45 - Q2 2007. Technical report (2007), http://www.altera.com/literature/lit-index.html
-
(2007)
-
-
-
25
-
-
0033099611
-
Good Error-Correcting Codes Based on Very Sparse Matrices
-
MacKay, D.J.C.: Good Error-Correcting Codes Based on Very Sparse Matrices. IEEE Transactions on Information Theory 45(2), 399-431 (1999)
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.2
, pp. 399-431
-
-
MacKay, D.J.C.1
-
26
-
-
84949754918
-
Implementation of Near Shannon Limit Error-Correcting Codes Using Reconfigurable Hardware
-
April 17-19, IEEE Computer Society, Los Alamitos () 2000
-
Levine, B.A., Reed Taylor, R., Schmit, H.: Implementation of Near Shannon Limit Error-Correcting Codes Using Reconfigurable Hardware. In: IEEE Symposium on Field-Programmable Custom Computing Machines -FCCM 2000, April 17-19, 2000, pp. 217-226. IEEE Computer Society, Los Alamitos (2000)
-
(2000)
IEEE Symposium on Field-Programmable Custom Computing Machines -FCCM
, pp. 217-226
-
-
Levine, B.A.1
Reed Taylor, R.2
Schmit, H.3
-
27
-
-
34047154588
-
Disclosing the LDPC code decoder design space
-
Gielen, G.G.E, ed, European Design and Automation Association, Leuven, Belgium, March 6-10, 2006
-
Brack, T., Kienle, F., Wenn, N.: Disclosing the LDPC code decoder design space. In: Gielen, G.G.E. (ed.) Conference on Design, Automation and Test in Europe - DATE 2006, European Design and Automation Association, Leuven, Belgium, March 6-10, 2006, pp. 200-205 (2006)
-
(2006)
Conference on Design, Automation and Test in Europe - DATE
, pp. 200-205
-
-
Brack, T.1
Kienle, F.2
Wenn, N.3
-
28
-
-
51049113719
-
-
Master's thesis, Chair for System Security, Department of Electrical Engineering and Information Science, Ruhr-Universität Bochum March
-
Bösch, C.: Efficient fuzzy extractors for reconfigurable hardware. Master's thesis, Chair for System Security, Department of Electrical Engineering and Information Science, Ruhr-Universität Bochum (March 2008)
-
(2008)
Efficient fuzzy extractors for reconfigurable hardware
-
-
Bösch, C.1
-
29
-
-
0036567024
-
Block error-correcting codes for systems with a very high BER.: Theoretical analysis and application to the protection of watermarks
-
Desset, C., Macq, B., Vandendorpe, L.: Block error-correcting codes for systems with a very high BER.: Theoretical analysis and application to the protection of watermarks. Signal Processing: Image Communication 17(5), 409-421 (2002)
-
(2002)
Signal Processing: Image Communication
, vol.17
, Issue.5
, pp. 409-421
-
-
Desset, C.1
Macq, B.2
Vandendorpe, L.3
-
30
-
-
3142677320
-
Computing the word-, symbol-, and bit-error rates for block error-correcting codes
-
Desset, C., Macq, B.M., Vandendorpe, L.: Computing the word-, symbol-, and bit-error rates for block error-correcting codes. IEEE Transactions on Communications 52(6), 910-921 (2004)
-
(2004)
IEEE Transactions on Communications
, vol.52
, Issue.6
, pp. 910-921
-
-
Desset, C.1
Macq, B.M.2
Vandendorpe, L.3
-
31
-
-
84991939136
-
LFSR-based Hashing and Authentication
-
Desmedt, Y.G, ed, CRYPTO 1994, Springer, Heidelberg
-
Krawczyk, H.: LFSR-based Hashing and Authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129-139. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
32
-
-
84957663269
-
Software Performance of Universal Hash Functions
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Nevelsteen, W., Preneel, B.: Software Performance of Universal Hash Functions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 24-41. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 24-41
-
-
Nevelsteen, W.1
Preneel, B.2
-
33
-
-
30344451674
-
Energy Scalable Universal Hashing
-
Kaps, J.P., Yüksel, K., Sunar, B.: Energy Scalable Universal Hashing., IEEE Trans. Computers 54(12), 1484-1495 (2005)
-
(2005)
IEEE Trans. Computers
, vol.54
, Issue.12
, pp. 1484-1495
-
-
Kaps, J.P.1
Yüksel, K.2
Sunar, B.3
|