-
1
-
-
85077688405
-
Active hardware metering for intellectual property protection and security
-
Y. Alkabani and F. Koushanfar. Active hardware metering for intellectual property protection and security. In USENIX Security, pages 291-306, 2007.
-
(2007)
USENIX Security
, pp. 291-306
-
-
Alkabani, Y.1
Koushanfar, F.2
-
2
-
-
51549084467
-
N-variant IC design: Methodology and applications
-
Y. Alkabani and F. Koushanfar. N-variant IC design: Methodology and applications. In DAC, pages 546-551, 2008.
-
(2008)
DAC
, pp. 546-551
-
-
Alkabani, Y.1
Koushanfar, F.2
-
4
-
-
34547623904
-
Physically unclonable function-based security and privacy in RFID systems
-
L. Bolotnyy and G. Robins. Physically unclonable function-based security and privacy in RFID systems. In PERCOM, pages 211-220, 2007.
-
(2007)
PERCOM
, pp. 211-220
-
-
Bolotnyy, L.1
Robins, G.2
-
5
-
-
0038341105
-
Silicon physical random functions
-
B. Gassend et al. Silicon physical random functions. In CCS, pages 148-160, 2002.
-
(2002)
CCS
, pp. 148-160
-
-
Gassend, B.1
-
6
-
-
4344587804
-
Identification and authentication of integrated circuits
-
John Wiley & Sons
-
B. Gassend et al. Identification and authentication of integrated circuits. Concurrency and Computation: Practice and Experience. John Wiley & Sons, 16(11): 1077-1098, 2004.
-
(2004)
Concurrency and Computation: Practice and Experience
, vol.16
, Issue.11
, pp. 1077-1098
-
-
Gassend, B.1
-
7
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
J. Guajardo et al. FPGA intrinsic PUFs and their use for IP protection. In CHES, pages 63-80, 2007.
-
(2007)
CHES
, pp. 63-80
-
-
Guajardo, J.1
-
8
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
J.W. Lee et al. A technique to build a secret key in integrated circuits for identification and authentication applications. In Symposium of VLSI Circuits, pages 176-179, 2004.
-
(2004)
Symposium of VLSI Circuits
, pp. 176-179
-
-
Lee, J.W.1
-
9
-
-
49749144533
-
Remote activation of ICs for piracy prevention and digital right management
-
Y. Alkabani et al. Remote activation of ICs for piracy prevention and digital right management. In ICCAD, pages 674-677, 2007.
-
(2007)
ICCAD
, pp. 674-677
-
-
Alkabani, Y.1
-
10
-
-
33845429016
-
A case against currently used hash functions in RFID protocols
-
M. Feldhofer and C. Rechberger. A case against currently used hash functions in RFID protocols. In Workshop on RFID Security, pages 372-381, 2006.
-
(2006)
Workshop on RFID Security
, pp. 372-381
-
-
Feldhofer, M.1
Rechberger, C.2
-
11
-
-
34547252533
-
-
F. Koushanfar and M. Potkonjak. Cad-based security, cryptography, and digital rights management. In DAC, 2007.
-
F. Koushanfar and M. Potkonjak. Cad-based security, cryptography, and digital rights management. In DAC, 2007.
-
-
-
-
12
-
-
57849084599
-
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak. Lightweight secure puf design for embedded systems. In Technical report - TREE0803, 2008.
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak. Lightweight secure puf design for embedded systems. In Technical report - TREE0803, 2008.
-
-
-
-
13
-
-
67249147207
-
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak. Testing techniques for hardware security. In ITC, 2008.
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak. Testing techniques for hardware security. In ITC, 2008.
-
-
-
-
14
-
-
43749112190
-
Within-die delay variability in 90nm FPGAs and beyond
-
P. Sedcole and P. Y. K. Cheung. Within-die delay variability in 90nm FPGAs and beyond. In FPT, pages 97-104, 2006.
-
(2006)
FPT
, pp. 97-104
-
-
Sedcole, P.1
Cheung, P.Y.K.2
-
15
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
G. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. In DAC, pages 9-14, 2007.
-
(2007)
DAC
, pp. 9-14
-
-
Suh, G.1
Devadas, S.2
-
16
-
-
34547294309
-
Trusted design in FPGAs
-
S. Trimberger. Trusted design in FPGAs. In DAC, pages 5-8, 2007.
-
(2007)
DAC
, pp. 5-8
-
-
Trimberger, S.1
|