-
1
-
-
0000026159
-
The relaxation method for linear inequalities
-
Agmon S. The relaxation method for linear inequalities. Canadian J. Math. (1964)
-
(1964)
Canadian J. Math.
-
-
Agmon, S.1
-
4
-
-
0001926474
-
A polynomial-time algorithm for learning noisy linear threshold functions
-
Blum A., Frieze A.M., Kannan R., and Vempala S. A polynomial-time algorithm for learning noisy linear threshold functions. Algorithmica 22 1-2 (1998) 35-52
-
(1998)
Algorithmica
, vol.22
, Issue.1-2
, pp. 35-52
-
-
Blum, A.1
Frieze, A.M.2
Kannan, R.3
Vempala, S.4
-
5
-
-
85051131411
-
Training a 3-node neural network is np-complete
-
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA
-
Blum A., and Rivest R.L. Training a 3-node neural network is np-complete. COLT '88: Proceedings of the First Annual Workshop on Computational Learning Theory (1988), Morgan Kaufmann Publishers Inc., San Francisco, CA, USA
-
(1988)
COLT '88: Proceedings of the First Annual Workshop on Computational Learning Theory
-
-
Blum, A.1
Rivest, R.L.2
-
6
-
-
34547623904
-
Physically unclonable function-based security and privacy in rfid systems
-
IEEE Computer Society, Washington, DC, USA
-
Bolotnyy L., and Robins G. Physically unclonable function-based security and privacy in rfid systems. PERCOM '07: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications (2007), IEEE Computer Society, Washington, DC, USA
-
(2007)
PERCOM '07: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
-
-
Bolotnyy, L.1
Robins, G.2
-
7
-
-
55349125414
-
-
M. Feldhofer, S. Dominikus, J. Wolkerstorfer, Strong authentication for RFID systems using the AES algorithm, in: CHES, 2004
-
M. Feldhofer, S. Dominikus, J. Wolkerstorfer, Strong authentication for RFID systems using the AES algorithm, in: CHES, 2004
-
-
-
-
8
-
-
55349141142
-
-
V. Feldman, P. Gopalan, S. Khot, A.K. Ponnuswami, New results for learning noisy parities and halfspaces, in: FOCS '06
-
V. Feldman, P. Gopalan, S. Khot, A.K. Ponnuswami, New results for learning noisy parities and halfspaces, in: FOCS '06
-
-
-
-
9
-
-
0038341105
-
Silicon physical random functions
-
ACM, New York, NY, USA
-
Gassend B., Clarke D., van Dijk M., and Devadas S. Silicon physical random functions. CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security (2002), ACM, New York, NY, USA
-
(2002)
CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security
-
-
Gassend, B.1
Clarke, D.2
van Dijk, M.3
Devadas, S.4
-
10
-
-
0037999043
-
-
B. Gassend, D. Clarke, M. van Dijk, S. Devadas, Delay-based circuit authentication and applications, in: Proceedings of the 2003 ACM Symposium on Applied Computing, 2003
-
B. Gassend, D. Clarke, M. van Dijk, S. Devadas, Delay-based circuit authentication and applications, in: Proceedings of the 2003 ACM Symposium on Applied Computing, 2003
-
-
-
-
11
-
-
44449155290
-
-
+, in: EUROCRYPT, 2008, pp. 361-378
-
+, in: EUROCRYPT, 2008, pp. 361-378
-
-
-
-
12
-
-
27644472569
-
An active attack against HB+ a provably secure lightweight authentication protocol
-
Gilbert H., Robshaw M., and Sibert H. An active attack against HB+ a provably secure lightweight authentication protocol. IEE Electron. Lett. 41 (2005) 21
-
(2005)
IEE Electron. Lett.
, vol.41
, pp. 21
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
13
-
-
0000069809
-
Majority gates vs. general weighted threshold gates
-
Goldmann M., Håstad J., and Razborov A.A. Majority gates vs. general weighted threshold gates. Comput. Complex. 2 (1992) 277-300
-
(1992)
Comput. Complex.
, vol.2
, pp. 277-300
-
-
Goldmann, M.1
Håstad, J.2
Razborov, A.A.3
-
14
-
-
55349095876
-
-
O. Goldreich, S. Goldwasser, S. Halevi, Eliminating decryption errors in the ajtai-dwork cryptosystem, in: CRYPTO '97
-
O. Goldreich, S. Goldwasser, S. Halevi, Eliminating decryption errors in the ajtai-dwork cryptosystem, in: CRYPTO '97
-
-
-
-
15
-
-
45749153036
-
PUF-HB: A tamper-resilient HB based authentication protocol
-
Hammouri G., and Sunar B. PUF-HB: A tamper-resilient HB based authentication protocol. ACNS (2008) 346-365
-
(2008)
ACNS
, pp. 346-365
-
-
Hammouri, G.1
Sunar, B.2
-
17
-
-
55349084836
-
-
A. Juels, S.A. Weis, Authenticating pervasive devices with human protocols, in: CRYPTO, 2005
-
A. Juels, S.A. Weis, Authenticating pervasive devices with human protocols, in: CRYPTO, 2005
-
-
-
-
18
-
-
33749382575
-
Energy comparison of AES and SHA-1 for ubiquitous computing
-
Embedded and Ubiquitous Computing (EUC-06) Workshop Proceedings. Z. X., et al. (Ed), Springer
-
Kaps J.-P., and Sunar B. Energy comparison of AES and SHA-1 for ubiquitous computing. In: Z. X., et al. (Ed). Embedded and Ubiquitous Computing (EUC-06) Workshop Proceedings. Lecture Notes in Computer Science (LNCS) vol. 4097 (2006), Springer
-
(2006)
Lecture Notes in Computer Science (LNCS)
, vol.4097
-
-
Kaps, J.-P.1
Sunar, B.2
-
20
-
-
0032202014
-
Efficient noise-tolerant learning from statistical queries
-
Kearns M. Efficient noise-tolerant learning from statistical queries. J. ACM 45 6 (1998) 983-1006
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 983-1006
-
-
Kearns, M.1
-
21
-
-
0028324717
-
Cryptographic limitations on learning boolean formulae and finite automata
-
Kearns M., and Valiant L. Cryptographic limitations on learning boolean formulae and finite automata. J. ACM 41 1 (1994) 67-95
-
(1994)
J. ACM
, vol.41
, Issue.1
, pp. 67-95
-
-
Kearns, M.1
Valiant, L.2
-
24
-
-
35348921036
-
Cryptographic hardness for learning intersections of halfspaces
-
FOCS'06, IEEE Computer Society, Washington, DC, USA
-
Klivans A.R., and Sherstov A.A. Cryptographic hardness for learning intersections of halfspaces. FOCS '06: Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science. FOCS'06 (2006), IEEE Computer Society, Washington, DC, USA
-
(2006)
FOCS '06: Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science
-
-
Klivans, A.R.1
Sherstov, A.A.2
-
25
-
-
35348904454
-
Unconditional lower bounds for learning intersections of halfspaces
-
Klivans A.R., and Sherstov A.A. Unconditional lower bounds for learning intersections of halfspaces. Mach. Learn. 69 2-3 (2007) 97-114
-
(2007)
Mach. Learn.
, vol.69
, Issue.2-3
, pp. 97-114
-
-
Klivans, A.R.1
Sherstov, A.A.2
-
26
-
-
4544381402
-
-
J.W. Lee, L. Daihyun, B. Gassend, G.E.S. amd, M. van Dijk, S. Devadas, A technique to build a secret key in integrated circuits for identification and authentication applications, in: Symposium of VLSI Circuits, 2004
-
J.W. Lee, L. Daihyun, B. Gassend, G.E.S. amd, M. van Dijk, S. Devadas, A technique to build a secret key in integrated circuits for identification and authentication applications, in: Symposium of VLSI Circuits, 2004
-
-
-
-
27
-
-
55349131418
-
-
S. Lemieux, A. Tang, Clone resistant mutual authentication for low-cost rfid technology, Cryptology ePrint Archive, Report 2007/170, 2007
-
S. Lemieux, A. Tang, Clone resistant mutual authentication for low-cost rfid technology, Cryptology ePrint Archive, Report 2007/170, 2007
-
-
-
-
28
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Lim D., Lee J.W., Gassend B., Suh G.E., van Dijk M., and Devadas S. Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13 10 (2005) 1200-1205
-
(2005)
IEEE Trans. VLSI Syst.
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
van Dijk, M.5
Devadas, S.6
-
29
-
-
84937740421
-
Shift-register synthesis and BCH decoding
-
Massey J. Shift-register synthesis and BCH decoding. IEEE Trans. Inform. Theory 15 1 (1969) 122-127
-
(1969)
IEEE Trans. Inform. Theory
, vol.15
, Issue.1
, pp. 122-127
-
-
Massey, J.1
-
30
-
-
55349099950
-
-
C.W. O'Donnell, G.E. Suh, S. Devadas, Puf-based random number generation, No. 481, November 2004
-
C.W. O'Donnell, G.E. Suh, S. Devadas, Puf-based random number generation, No. 481, November 2004
-
-
-
-
31
-
-
51749083449
-
-
E. Ozturk, G. Hammouri, B. Sunar, Physical unclonable function with tristate buffers, in: The IEEE International Symposium on Circuits and Systems 2008, ISCAS 2008
-
E. Ozturk, G. Hammouri, B. Sunar, Physical unclonable function with tristate buffers, in: The IEEE International Symposium on Circuits and Systems 2008, ISCAS 2008
-
-
-
-
32
-
-
49149115221
-
-
E. Ozturk, G. Hammouri, B. Sunar, Towards robust low cost authentication for pervasive devices, in: PERCOM '08: Proceedings of the Sixth IEEE International Conference on Pervasive Computing and Communications
-
E. Ozturk, G. Hammouri, B. Sunar, Towards robust low cost authentication for pervasive devices, in: PERCOM '08: Proceedings of the Sixth IEEE International Conference on Pervasive Computing and Communications
-
-
-
-
33
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig A., Szewczyk R., Tygar J.D., Wen V., and Culler D.E. SPINS: Security protocols for sensor networks. Wireless Netw. 8 (2002) 521-534
-
(2002)
Wireless Netw.
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
34
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
IEEE Computer Society, Washington, DC, USA
-
Perrig A., Tygar J.D., Song D., and Canetti R. Efficient authentication and signing of multicast streams over lossy channels. SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy (2000), IEEE Computer Society, Washington, DC, USA
-
(2000)
SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy
-
-
Perrig, A.1
Tygar, J.D.2
Song, D.3
Canetti, R.4
-
35
-
-
0009553549
-
Protecting devices by active coating
-
Posch R. Protecting devices by active coating. J. Univ. Comput. Sci. 4 7 (1998) 652-668
-
(1998)
J. Univ. Comput. Sci.
, vol.4
, Issue.7
, pp. 652-668
-
-
Posch, R.1
-
36
-
-
34548860970
-
-
A. Poschmann, G. Leander, K. Schramm, C. Paar, New ligh-weight crypto algorithms for RFID, in: Proceedings of The IEEE International Symposium on Circuits and Systems 2007, ISCAS 2007, 2007
-
A. Poschmann, G. Leander, K. Schramm, C. Paar, New ligh-weight crypto algorithms for RFID, in: Proceedings of The IEEE International Symposium on Circuits and Systems 2007, ISCAS 2007, 2007
-
-
-
-
37
-
-
33745571012
-
On lattices, learning with errors, random linear codes, and cryptography
-
ACM, New York, NY, USA
-
Regev O. On lattices, learning with errors, random linear codes, and cryptography. STOC '05: Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing (2005), ACM, New York, NY, USA
-
(2005)
STOC '05: Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing
-
-
Regev, O.1
-
39
-
-
0010999643
-
Linear complexity and random sequences
-
Springer-Verlag New York, Inc.
-
Rueppel R.A. Linear complexity and random sequences. EUROCRYPT '85 (1986), Springer-Verlag New York, Inc.
-
(1986)
EUROCRYPT '85
-
-
Rueppel, R.A.1
-
40
-
-
2942590116
-
RFID systems and security and privacy implications
-
Springer-Verlag, London, UK
-
Sarma S.E., Weis S.A., and Engels D.W. RFID systems and security and privacy implications. CHES '02 (2003), Springer-Verlag, London, UK
-
(2003)
CHES '02
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
41
-
-
55349134969
-
-
B. Skoric, S. Maubach, T. Kevenaar, P. Tuyls, Information-theoretic analysis of coating PUFs, Cryptology ePrint Archive, Report 2006/101, 2006
-
B. Skoric, S. Maubach, T. Kevenaar, P. Tuyls, Information-theoretic analysis of coating PUFs, Cryptology ePrint Archive, Report 2006/101, 2006
-
-
-
-
42
-
-
34547674038
-
Secret key generation from classical physics: Physical uncloneable functions
-
AmIware: Hardware Technology Drivers of Ambient Intelligence. Mukherjee S., Aarts E., Roovers R., Widdershoven F., and Ouwerkerk M. (Eds), Springer-Verlag
-
Tuyls P., and Skoric B. Secret key generation from classical physics: Physical uncloneable functions. In: Mukherjee S., Aarts E., Roovers R., Widdershoven F., and Ouwerkerk M. (Eds). AmIware: Hardware Technology Drivers of Ambient Intelligence. Philips Research Book Series vol. 5 (2006), Springer-Verlag
-
(2006)
Philips Research Book Series
, vol.5
-
-
Tuyls, P.1
Skoric, B.2
-
43
-
-
0021518106
-
A theory of the learnable
-
Valiant L.G. A theory of the learnable. Commun. ACM 27 11 (1984) 1134-1142
-
(1984)
Commun. ACM
, vol.27
, Issue.11
, pp. 1134-1142
-
-
Valiant, L.G.1
-
45
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Security in Pervasive Computing
-
Weis S.A., Sarma S.E., Rivest R.L., and Engels D.W. Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing. Lecture Notes in Computer Science vol. 2802 (2004)
-
(2004)
Lecture Notes in Computer Science
, vol.2802
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|