메뉴 건너뛰기




Volumn 5284 LNCS, Issue , 2008, Pages 102-117

Trusted integrated circuits: A nondestructive hidden characteristics extraction approach

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; EXTRACTION; LEAKAGE CURRENTS; TIMING CIRCUITS;

EID: 56749170623     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88961-8_8     Document Type: Conference Paper
Times cited : (54)

References (22)
  • 2
    • 85034664741 scopus 로고
    • Another birthday attack
    • Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
    • Coppersmith, D.: Another birthday attack. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 14-17. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.218 , pp. 14-17
    • Coppersmith, D.1
  • 3
    • 84886673851 scopus 로고    scopus 로고
    • Friedberg, P., et al.: Modeling within-die spatial correlation effects for process-design co-optimization. In: ISQED, pp. 516-521 (2005)
    • Friedberg, P., et al.: Modeling within-die spatial correlation effects for process-design co-optimization. In: ISQED, pp. 516-521 (2005)
  • 4
    • 4344587804 scopus 로고    scopus 로고
    • Identification and authentication of integrated circuits
    • John Wiley & Sons, Chichester
    • Gassend, B., et al.: Identification and authentication of integrated circuits. In: Concurrency and Computation: Practice and Experience, vol. 16, pp. 1077-1098. John Wiley & Sons, Chichester (2004)
    • (2004) Concurrency and Computation: Practice and Experience , vol.16 , pp. 1077-1098
    • Gassend, B.1
  • 6
    • 33748535403 scopus 로고    scopus 로고
    • High-performance CMOS variability in the 65-nm regime and beyond
    • Bernstein, K., et al: High-performance CMOS variability in the 65-nm regime and beyond. IBM Journal of Research and Development 50(4/5), 433-450 (2006)
    • (2006) IBM Journal of Research and Development , vol.50 , Issue.4-5 , pp. 433-450
    • Bernstein, K.1
  • 7
    • 0141517673 scopus 로고    scopus 로고
    • Local watermarks: Methodology and application to behavioral synthesis
    • Kirovski, D., Potkonjak, M.: Local watermarks: methodology and application to behavioral synthesis. IEEE Trans. CAD 22(9), 1277-1283 (2003)
    • (2003) IEEE Trans. CAD , vol.22 , Issue.9 , pp. 1277-1283
    • Kirovski, D.1    Potkonjak, M.2
  • 10
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication applications
    • Lee, J., et al.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium of VLSI, pp. 176-179 (2004)
    • (2004) Symposium of VLSI , pp. 176-179
    • Lee, J.1
  • 11
    • 0034428343 scopus 로고    scopus 로고
    • IC identification circuits using device mismatch
    • Lofstrom, K., et al.: IC identification circuits using device mismatch. In: ISSCC, pp. 372-373 (2000)
    • (2000) ISSCC , pp. 372-373
    • Lofstrom, K.1
  • 12
    • 0041663673 scopus 로고    scopus 로고
    • An artificial fingerprint device (AFD): A study of identification number applications utilizing characteristics variation of polycrystalline silicon TFTs
    • Maeda, S., et al.: An artificial fingerprint device (AFD): a study of identification number applications utilizing characteristics variation of polycrystalline silicon TFTs. IEEE Trans. Electron. Devices 50(6), 1451-1458 (2003)
    • (2003) IEEE Trans. Electron. Devices , vol.50 , Issue.6 , pp. 1451-1458
    • Maeda, S.1
  • 13
    • 21144465196 scopus 로고
    • A birthday problem solution for nonuniform birthday frequencies
    • Nunnukhoven, T.: A birthday problem solution for nonuniform birthday frequencies. The American Statistician 46(4), 270-274 (1992)
    • (1992) The American Statistician , vol.46 , Issue.4 , pp. 270-274
    • Nunnukhoven, T.1
  • 14
    • 32044442310 scopus 로고    scopus 로고
    • Reliability concerns in embedded system designs
    • Vijaykrishnan, N., Xie, Y.: Reliability concerns in embedded system designs. IEEE Computer 39(1), 118-120 (2006)
    • (2006) IEEE Computer , vol.39 , Issue.1 , pp. 118-120
    • Vijaykrishnan, N.1    Xie, Y.2
  • 15
    • 0035440030 scopus 로고    scopus 로고
    • Techniques for the creation of digital watermarks in sequential circuit designs
    • Oliveira, A.: Techniques for the creation of digital watermarks in sequential circuit designs. IEEE Trans. on CAD 20(9), 1101-1117 (2001)
    • (2001) IEEE Trans. on CAD , vol.20 , Issue.9 , pp. 1101-1117
    • Oliveira, A.1
  • 17
    • 33645753044 scopus 로고    scopus 로고
    • Statistical Analysis and Optimization for VLSI: Timing and Power
    • Springer, Heidelberg
    • Srivastava, A., et al.: Statistical Analysis and Optimization for VLSI: Timing and Power. Series on Integrated Circuits and Systems. Springer, Heidelberg (2005)
    • (2005) Series on Integrated Circuits and Systems
    • Srivastava, A.1
  • 18
    • 34548818732 scopus 로고    scopus 로고
    • A 1.6 J/bit stable chip ID generating circuit using process variations
    • Su, Y., et al.: A 1.6 J/bit stable chip ID generating circuit using process variations. In: ISSCC, 406-107 (2007)
    • (2007) ISSCC , vol.406 -107
    • Su, Y.1
  • 19
    • 27544441530 scopus 로고    scopus 로고
    • Design and implementation of the aegis single-chip secure processor using physical random functions
    • Suh, G., et al.: Design and implementation of the aegis single-chip secure processor using physical random functions. In: ISCA, pp. 25-36 (2005)
    • (2005) ISCA , pp. 25-36
    • Suh, G.1
  • 21
    • 0033879740 scopus 로고    scopus 로고
    • Watermarking-based copyright protection of sequential functions
    • Torunoglu, I., Charbon, E.: Watermarking-based copyright protection of sequential functions. JSSC 35(3), 434-440 (2000)
    • (2000) JSSC , vol.35 , Issue.3 , pp. 434-440
    • Torunoglu, I.1    Charbon, E.2
  • 22
    • 33645009272 scopus 로고    scopus 로고
    • A combined gate replacement and input vector control approach for leakage current reduction
    • Yuan, L., Qu, G.: A combined gate replacement and input vector control approach for leakage current reduction. IEEE Trans. on VLSI 14(2), 173-182 (2006)
    • (2006) IEEE Trans. on VLSI , vol.14 , Issue.2 , pp. 173-182
    • Yuan, L.1    Qu, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.