메뉴 건너뛰기




Volumn 5154 LNCS, Issue , 2008, Pages 181-197

Efficient helper data key extractor on FPGAs

Author keywords

FPGAs; Fuzzy Extractor; Helper Data Algorithm; Implementation; Intrinsic PUF; Physical Unclonable Functions

Indexed keywords

APPLICATIONS; CODES (SYMBOLS); COMPUTER PROGRAMMING LANGUAGES; ELECTRIC BREAKDOWN; ERROR ANALYSIS; ERROR CORRECTION; FIELD PROGRAMMABLE GATE ARRAYS (FPGA); INTEGRATED CIRCUITS; INTERNET PROTOCOLS; SOLUTIONS;

EID: 51049117293     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85053-3_12     Document Type: Conference Paper
Times cited : (237)

References (34)
  • 2
    • 33750726983 scopus 로고    scopus 로고
    • Tuyls, P., Schrijen, G.-J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.:: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 369-383. Springer, Heidelberg (2006)
    • Tuyls, P., Schrijen, G.-J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.:: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
  • 3
    • 84870642654 scopus 로고    scopus 로고
    • TPM main specification
    • Trusted Computing Group:, Technical Report Version 1.2 Revision 94 March
    • Trusted Computing Group: TPM main specification. Technical Report Version 1.2 Revision 94 (March 2006)
    • (2006)
  • 5
    • 38049015807 scopus 로고    scopus 로고
    • Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, 4727, pp. 63-80. Springer, Heidelberg (2007)
    • Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
  • 6
    • 51049115248 scopus 로고    scopus 로고
    • Randomized resonators as uniquely identifiable anti-counterfeiting tags
    • Technical report, Philips Research Laboratories January 28
    • Škorić, B., Bel, T., Blom, A., de Jong, B., Kretschman, H., Nellissen, A.: Randomized resonators as uniquely identifiable anti-counterfeiting tags. Technical report, Philips Research Laboratories (January 28, 2008)
    • (2008)
    • Škorić, B.1    Bel, T.2    Blom, A.3    de Jong, B.4    Kretschman, H.5    Nellissen, A.6
  • 8
    • 33750702480 scopus 로고    scopus 로고
    • Simpson, E., Schaumont, P.: Offline Hardware/Software Authentication for Reconfigurable Platforms. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 311-323. Springer, Heidelberg (2006)
    • Simpson, E., Schaumont, P.: Offline Hardware/Software Authentication for Reconfigurable Platforms. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 311-323. Springer, Heidelberg (2006)
  • 10
    • 35248839355 scopus 로고    scopus 로고
    • New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometrie Templates
    • Kittler, J, Nixon, M.S, eds, AVBPA 2003, Springer, Heidelberg
    • Linnartz, J.P.M.G., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometrie Templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393-402. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2688 , pp. 393-402
    • Linnartz, J.P.M.G.1    Tuyls, P.2
  • 11
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Cachin, C, Camenisch, J.L, eds, EU-RCCRYPT 2004, Springer, Heidelberg
    • Dodis, Y., Reyzin, M., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EU-RCCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, M.2    Smith, A.3
  • 12
    • 37149044968 scopus 로고    scopus 로고
    • Suh, G.E., O'Donnell, C.W., Devadas, S.: AEGIS: A Single-Chip Secure Processor. IEEE Design & Test of Computers 24(6), 570-580 (2007)
    • Suh, G.E., O'Donnell, C.W., Devadas, S.: AEGIS: A Single-Chip Secure Processor. IEEE Design & Test of Computers 24(6), 570-580 (2007)
  • 13
    • 51049102686 scopus 로고    scopus 로고
    • Dijk, M.v., Lim, D., Devadas, S.: Reliable Secret Sharing With Physical R.andom Functions. Computation Structures Group Memo 475, CSAIL - Massachusetts Institute of Technology (2004)
    • Dijk, M.v., Lim, D., Devadas, S.: Reliable Secret Sharing With Physical R.andom Functions. Computation Structures Group Memo 475, CSAIL - Massachusetts Institute of Technology (2004)
  • 14
    • 4344584084 scopus 로고    scopus 로고
    • Master's thesis, Computer Science and Artificial Intelligence Laboratory, MIT Computation Structures Group Memo, February
    • Gassend, B.: Physical Random Functions. Master's thesis, Computer Science and Artificial Intelligence Laboratory, MIT Computation Structures Group Memo 458 (February 2003)
    • (2003) Physical Random Functions , pp. 458
    • Gassend, B.1
  • 17
    • 0000292532 scopus 로고
    • Codes Correcteurs D'erreurs.
    • Hochquenghem, A.: Codes Correcteurs D'erreurs. Chiffres 2, 147-156 (1959)
    • (1959) Chiffres , vol.2 , pp. 147-156
    • Hochquenghem, A.1
  • 18
    • 50549175697 scopus 로고
    • On a Class of Error-Correcting Binary Group Codes
    • Bose, R.C., Ray-Chaudhuri, D.K.: On a Class of Error-Correcting Binary Group Codes. Information and Control 3, 68-79 (1960)
    • (1960) Information and Control , vol.3 , pp. 68-79
    • Bose, R.C.1    Ray-Chaudhuri, D.K.2
  • 19
    • 0003367131 scopus 로고
    • Concatenated Codes
    • MIT Press, Cambridge
    • Forney Jr., G.D.: Concatenated Codes. Research Monograph No. 37. MIT Press, Cambridge (1966)
    • (1966) Research Monograph , vol.37
    • Forney Jr., G.D.1
  • 22
    • 0018456171 scopus 로고
    • Universal Classes of Hash Functions
    • Carter, L., Wegman, M.N.: Universal Classes of Hash Functions. J. Comput. Syst. Sci. 18(2), 143-154 (1979)
    • (1979) J. Comput. Syst. Sci , vol.18 , Issue.2 , pp. 143-154
    • Carter, L.1    Wegman, M.N.2
  • 23
    • 51049092411 scopus 로고    scopus 로고
    • Fourth Quarter 2007
    • Technical Report UG116 v4.3, February 6
    • Xilinx: Device Reliability Report -Fourth Quarter 2007. Technical Report UG116 (v4.3) (February 6, 2008), http://www.xilinx.com/support/documentation/
    • (2008) Device Reliability Report
  • 24
    • 51049083272 scopus 로고    scopus 로고
    • Reliability Report 45 - Q2 2007
    • Technical report
    • Altera: Reliability Report 45 - Q2 2007. Technical report (2007), http://www.altera.com/literature/lit-index.html
    • (2007)
  • 25
    • 0033099611 scopus 로고    scopus 로고
    • Good Error-Correcting Codes Based on Very Sparse Matrices
    • MacKay, D.J.C.: Good Error-Correcting Codes Based on Very Sparse Matrices. IEEE Transactions on Information Theory 45(2), 399-431 (1999)
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.2 , pp. 399-431
    • MacKay, D.J.C.1
  • 26
    • 84949754918 scopus 로고    scopus 로고
    • Implementation of Near Shannon Limit Error-Correcting Codes Using Reconfigurable Hardware
    • April 17-19, IEEE Computer Society, Los Alamitos () 2000
    • Levine, B.A., Reed Taylor, R., Schmit, H.: Implementation of Near Shannon Limit Error-Correcting Codes Using Reconfigurable Hardware. In: IEEE Symposium on Field-Programmable Custom Computing Machines -FCCM 2000, April 17-19, 2000, pp. 217-226. IEEE Computer Society, Los Alamitos (2000)
    • (2000) IEEE Symposium on Field-Programmable Custom Computing Machines -FCCM , pp. 217-226
    • Levine, B.A.1    Reed Taylor, R.2    Schmit, H.3
  • 27
    • 34047154588 scopus 로고    scopus 로고
    • Disclosing the LDPC code decoder design space
    • Gielen, G.G.E, ed, European Design and Automation Association, Leuven, Belgium, March 6-10, 2006
    • Brack, T., Kienle, F., Wenn, N.: Disclosing the LDPC code decoder design space. In: Gielen, G.G.E. (ed.) Conference on Design, Automation and Test in Europe - DATE 2006, European Design and Automation Association, Leuven, Belgium, March 6-10, 2006, pp. 200-205 (2006)
    • (2006) Conference on Design, Automation and Test in Europe - DATE , pp. 200-205
    • Brack, T.1    Kienle, F.2    Wenn, N.3
  • 28
    • 51049113719 scopus 로고    scopus 로고
    • Master's thesis, Chair for System Security, Department of Electrical Engineering and Information Science, Ruhr-Universität Bochum March
    • Bösch, C.: Efficient fuzzy extractors for reconfigurable hardware. Master's thesis, Chair for System Security, Department of Electrical Engineering and Information Science, Ruhr-Universität Bochum (March 2008)
    • (2008) Efficient fuzzy extractors for reconfigurable hardware
    • Bösch, C.1
  • 29
    • 0036567024 scopus 로고    scopus 로고
    • Block error-correcting codes for systems with a very high BER.: Theoretical analysis and application to the protection of watermarks
    • Desset, C., Macq, B., Vandendorpe, L.: Block error-correcting codes for systems with a very high BER.: Theoretical analysis and application to the protection of watermarks. Signal Processing: Image Communication 17(5), 409-421 (2002)
    • (2002) Signal Processing: Image Communication , vol.17 , Issue.5 , pp. 409-421
    • Desset, C.1    Macq, B.2    Vandendorpe, L.3
  • 30
    • 3142677320 scopus 로고    scopus 로고
    • Computing the word-, symbol-, and bit-error rates for block error-correcting codes
    • Desset, C., Macq, B.M., Vandendorpe, L.: Computing the word-, symbol-, and bit-error rates for block error-correcting codes. IEEE Transactions on Communications 52(6), 910-921 (2004)
    • (2004) IEEE Transactions on Communications , vol.52 , Issue.6 , pp. 910-921
    • Desset, C.1    Macq, B.M.2    Vandendorpe, L.3
  • 31
    • 84991939136 scopus 로고
    • LFSR-based Hashing and Authentication
    • Desmedt, Y.G, ed, CRYPTO 1994, Springer, Heidelberg
    • Krawczyk, H.: LFSR-based Hashing and Authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129-139. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 32
    • 84957663269 scopus 로고    scopus 로고
    • Software Performance of Universal Hash Functions
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Nevelsteen, W., Preneel, B.: Software Performance of Universal Hash Functions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 24-41. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 24-41
    • Nevelsteen, W.1    Preneel, B.2
  • 33
    • 30344451674 scopus 로고    scopus 로고
    • Energy Scalable Universal Hashing
    • Kaps, J.P., Yüksel, K., Sunar, B.: Energy Scalable Universal Hashing., IEEE Trans. Computers 54(12), 1484-1495 (2005)
    • (2005) IEEE Trans. Computers , vol.54 , Issue.12 , pp. 1484-1495
    • Kaps, J.P.1    Yüksel, K.2    Sunar, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.