메뉴 건너뛰기




Volumn 4, Issue 6, 2008, Pages 807-818

A tamper-proof and lightweight authentication scheme

Author keywords

Low power authentication; Physical unclonable functions (PUF); RFIDs; Sensor networks security; Tamper proof chips

Indexed keywords

LOW POWER ELECTRONICS; RADIO FREQUENCY IDENTIFICATION (RFID); SENSOR NETWORKS;

EID: 55349112850     PISSN: 15741192     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.pmcj.2008.07.001     Document Type: Article
Times cited : (46)

References (45)
  • 1
    • 0000026159 scopus 로고
    • The relaxation method for linear inequalities
    • Agmon S. The relaxation method for linear inequalities. Canadian J. Math. (1964)
    • (1964) Canadian J. Math.
    • Agmon, S.1
  • 4
    • 0001926474 scopus 로고    scopus 로고
    • A polynomial-time algorithm for learning noisy linear threshold functions
    • Blum A., Frieze A.M., Kannan R., and Vempala S. A polynomial-time algorithm for learning noisy linear threshold functions. Algorithmica 22 1-2 (1998) 35-52
    • (1998) Algorithmica , vol.22 , Issue.1-2 , pp. 35-52
    • Blum, A.1    Frieze, A.M.2    Kannan, R.3    Vempala, S.4
  • 7
    • 55349125414 scopus 로고    scopus 로고
    • M. Feldhofer, S. Dominikus, J. Wolkerstorfer, Strong authentication for RFID systems using the AES algorithm, in: CHES, 2004
    • M. Feldhofer, S. Dominikus, J. Wolkerstorfer, Strong authentication for RFID systems using the AES algorithm, in: CHES, 2004
  • 8
    • 55349141142 scopus 로고    scopus 로고
    • V. Feldman, P. Gopalan, S. Khot, A.K. Ponnuswami, New results for learning noisy parities and halfspaces, in: FOCS '06
    • V. Feldman, P. Gopalan, S. Khot, A.K. Ponnuswami, New results for learning noisy parities and halfspaces, in: FOCS '06
  • 10
    • 0037999043 scopus 로고    scopus 로고
    • B. Gassend, D. Clarke, M. van Dijk, S. Devadas, Delay-based circuit authentication and applications, in: Proceedings of the 2003 ACM Symposium on Applied Computing, 2003
    • B. Gassend, D. Clarke, M. van Dijk, S. Devadas, Delay-based circuit authentication and applications, in: Proceedings of the 2003 ACM Symposium on Applied Computing, 2003
  • 11
    • 44449155290 scopus 로고    scopus 로고
    • +, in: EUROCRYPT, 2008, pp. 361-378
    • +, in: EUROCRYPT, 2008, pp. 361-378
  • 12
    • 27644472569 scopus 로고    scopus 로고
    • An active attack against HB+ a provably secure lightweight authentication protocol
    • Gilbert H., Robshaw M., and Sibert H. An active attack against HB+ a provably secure lightweight authentication protocol. IEE Electron. Lett. 41 (2005) 21
    • (2005) IEE Electron. Lett. , vol.41 , pp. 21
    • Gilbert, H.1    Robshaw, M.2    Sibert, H.3
  • 13
    • 0000069809 scopus 로고
    • Majority gates vs. general weighted threshold gates
    • Goldmann M., Håstad J., and Razborov A.A. Majority gates vs. general weighted threshold gates. Comput. Complex. 2 (1992) 277-300
    • (1992) Comput. Complex. , vol.2 , pp. 277-300
    • Goldmann, M.1    Håstad, J.2    Razborov, A.A.3
  • 14
    • 55349095876 scopus 로고    scopus 로고
    • O. Goldreich, S. Goldwasser, S. Halevi, Eliminating decryption errors in the ajtai-dwork cryptosystem, in: CRYPTO '97
    • O. Goldreich, S. Goldwasser, S. Halevi, Eliminating decryption errors in the ajtai-dwork cryptosystem, in: CRYPTO '97
  • 15
    • 45749153036 scopus 로고    scopus 로고
    • PUF-HB: A tamper-resilient HB based authentication protocol
    • Hammouri G., and Sunar B. PUF-HB: A tamper-resilient HB based authentication protocol. ACNS (2008) 346-365
    • (2008) ACNS , pp. 346-365
    • Hammouri, G.1    Sunar, B.2
  • 17
    • 55349084836 scopus 로고    scopus 로고
    • A. Juels, S.A. Weis, Authenticating pervasive devices with human protocols, in: CRYPTO, 2005
    • A. Juels, S.A. Weis, Authenticating pervasive devices with human protocols, in: CRYPTO, 2005
  • 18
    • 33749382575 scopus 로고    scopus 로고
    • Energy comparison of AES and SHA-1 for ubiquitous computing
    • Embedded and Ubiquitous Computing (EUC-06) Workshop Proceedings. Z. X., et al. (Ed), Springer
    • Kaps J.-P., and Sunar B. Energy comparison of AES and SHA-1 for ubiquitous computing. In: Z. X., et al. (Ed). Embedded and Ubiquitous Computing (EUC-06) Workshop Proceedings. Lecture Notes in Computer Science (LNCS) vol. 4097 (2006), Springer
    • (2006) Lecture Notes in Computer Science (LNCS) , vol.4097
    • Kaps, J.-P.1    Sunar, B.2
  • 20
    • 0032202014 scopus 로고    scopus 로고
    • Efficient noise-tolerant learning from statistical queries
    • Kearns M. Efficient noise-tolerant learning from statistical queries. J. ACM 45 6 (1998) 983-1006
    • (1998) J. ACM , vol.45 , Issue.6 , pp. 983-1006
    • Kearns, M.1
  • 21
    • 0028324717 scopus 로고
    • Cryptographic limitations on learning boolean formulae and finite automata
    • Kearns M., and Valiant L. Cryptographic limitations on learning boolean formulae and finite automata. J. ACM 41 1 (1994) 67-95
    • (1994) J. ACM , vol.41 , Issue.1 , pp. 67-95
    • Kearns, M.1    Valiant, L.2
  • 23
  • 25
    • 35348904454 scopus 로고    scopus 로고
    • Unconditional lower bounds for learning intersections of halfspaces
    • Klivans A.R., and Sherstov A.A. Unconditional lower bounds for learning intersections of halfspaces. Mach. Learn. 69 2-3 (2007) 97-114
    • (2007) Mach. Learn. , vol.69 , Issue.2-3 , pp. 97-114
    • Klivans, A.R.1    Sherstov, A.A.2
  • 26
    • 4544381402 scopus 로고    scopus 로고
    • J.W. Lee, L. Daihyun, B. Gassend, G.E.S. amd, M. van Dijk, S. Devadas, A technique to build a secret key in integrated circuits for identification and authentication applications, in: Symposium of VLSI Circuits, 2004
    • J.W. Lee, L. Daihyun, B. Gassend, G.E.S. amd, M. van Dijk, S. Devadas, A technique to build a secret key in integrated circuits for identification and authentication applications, in: Symposium of VLSI Circuits, 2004
  • 27
    • 55349131418 scopus 로고    scopus 로고
    • S. Lemieux, A. Tang, Clone resistant mutual authentication for low-cost rfid technology, Cryptology ePrint Archive, Report 2007/170, 2007
    • S. Lemieux, A. Tang, Clone resistant mutual authentication for low-cost rfid technology, Cryptology ePrint Archive, Report 2007/170, 2007
  • 29
    • 84937740421 scopus 로고
    • Shift-register synthesis and BCH decoding
    • Massey J. Shift-register synthesis and BCH decoding. IEEE Trans. Inform. Theory 15 1 (1969) 122-127
    • (1969) IEEE Trans. Inform. Theory , vol.15 , Issue.1 , pp. 122-127
    • Massey, J.1
  • 30
    • 55349099950 scopus 로고    scopus 로고
    • C.W. O'Donnell, G.E. Suh, S. Devadas, Puf-based random number generation, No. 481, November 2004
    • C.W. O'Donnell, G.E. Suh, S. Devadas, Puf-based random number generation, No. 481, November 2004
  • 31
    • 51749083449 scopus 로고    scopus 로고
    • E. Ozturk, G. Hammouri, B. Sunar, Physical unclonable function with tristate buffers, in: The IEEE International Symposium on Circuits and Systems 2008, ISCAS 2008
    • E. Ozturk, G. Hammouri, B. Sunar, Physical unclonable function with tristate buffers, in: The IEEE International Symposium on Circuits and Systems 2008, ISCAS 2008
  • 32
    • 49149115221 scopus 로고    scopus 로고
    • E. Ozturk, G. Hammouri, B. Sunar, Towards robust low cost authentication for pervasive devices, in: PERCOM '08: Proceedings of the Sixth IEEE International Conference on Pervasive Computing and Communications
    • E. Ozturk, G. Hammouri, B. Sunar, Towards robust low cost authentication for pervasive devices, in: PERCOM '08: Proceedings of the Sixth IEEE International Conference on Pervasive Computing and Communications
  • 35
    • 0009553549 scopus 로고    scopus 로고
    • Protecting devices by active coating
    • Posch R. Protecting devices by active coating. J. Univ. Comput. Sci. 4 7 (1998) 652-668
    • (1998) J. Univ. Comput. Sci. , vol.4 , Issue.7 , pp. 652-668
    • Posch, R.1
  • 36
    • 34548860970 scopus 로고    scopus 로고
    • A. Poschmann, G. Leander, K. Schramm, C. Paar, New ligh-weight crypto algorithms for RFID, in: Proceedings of The IEEE International Symposium on Circuits and Systems 2007, ISCAS 2007, 2007
    • A. Poschmann, G. Leander, K. Schramm, C. Paar, New ligh-weight crypto algorithms for RFID, in: Proceedings of The IEEE International Symposium on Circuits and Systems 2007, ISCAS 2007, 2007
  • 39
    • 0010999643 scopus 로고
    • Linear complexity and random sequences
    • Springer-Verlag New York, Inc.
    • Rueppel R.A. Linear complexity and random sequences. EUROCRYPT '85 (1986), Springer-Verlag New York, Inc.
    • (1986) EUROCRYPT '85
    • Rueppel, R.A.1
  • 40
    • 2942590116 scopus 로고    scopus 로고
    • RFID systems and security and privacy implications
    • Springer-Verlag, London, UK
    • Sarma S.E., Weis S.A., and Engels D.W. RFID systems and security and privacy implications. CHES '02 (2003), Springer-Verlag, London, UK
    • (2003) CHES '02
    • Sarma, S.E.1    Weis, S.A.2    Engels, D.W.3
  • 41
    • 55349134969 scopus 로고    scopus 로고
    • B. Skoric, S. Maubach, T. Kevenaar, P. Tuyls, Information-theoretic analysis of coating PUFs, Cryptology ePrint Archive, Report 2006/101, 2006
    • B. Skoric, S. Maubach, T. Kevenaar, P. Tuyls, Information-theoretic analysis of coating PUFs, Cryptology ePrint Archive, Report 2006/101, 2006
  • 42
    • 34547674038 scopus 로고    scopus 로고
    • Secret key generation from classical physics: Physical uncloneable functions
    • AmIware: Hardware Technology Drivers of Ambient Intelligence. Mukherjee S., Aarts E., Roovers R., Widdershoven F., and Ouwerkerk M. (Eds), Springer-Verlag
    • Tuyls P., and Skoric B. Secret key generation from classical physics: Physical uncloneable functions. In: Mukherjee S., Aarts E., Roovers R., Widdershoven F., and Ouwerkerk M. (Eds). AmIware: Hardware Technology Drivers of Ambient Intelligence. Philips Research Book Series vol. 5 (2006), Springer-Verlag
    • (2006) Philips Research Book Series , vol.5
    • Tuyls, P.1    Skoric, B.2
  • 43
    • 0021518106 scopus 로고
    • A theory of the learnable
    • Valiant L.G. A theory of the learnable. Commun. ACM 27 11 (1984) 1134-1142
    • (1984) Commun. ACM , vol.27 , Issue.11 , pp. 1134-1142
    • Valiant, L.G.1
  • 45
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Security in Pervasive Computing
    • Weis S.A., Sarma S.E., Rivest R.L., and Engels D.W. Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing. Lecture Notes in Computer Science vol. 2802 (2004)
    • (2004) Lecture Notes in Computer Science , vol.2802
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.