메뉴 건너뛰기




Volumn , Issue , 2008, Pages 670-673

Lightweight secure PUFs

Author keywords

[No Author keywords available]

Indexed keywords

CIRCUIT FAULTS; MULTIPLE DELAYS; NEW STRUCTURES; SECURITY ATTACKS; STATISTICAL ANALYSIS;

EID: 57849102046     PISSN: 10923152     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCAD.2008.4681648     Document Type: Conference Paper
Times cited : (301)

References (16)
  • 1
    • 85077688405 scopus 로고    scopus 로고
    • Active hardware metering for intellectual property protection and security
    • Y. Alkabani and F. Koushanfar. Active hardware metering for intellectual property protection and security. In USENIX Security, pages 291-306, 2007.
    • (2007) USENIX Security , pp. 291-306
    • Alkabani, Y.1    Koushanfar, F.2
  • 2
    • 51549084467 scopus 로고    scopus 로고
    • N-variant IC design: Methodology and applications
    • Y. Alkabani and F. Koushanfar. N-variant IC design: Methodology and applications. In DAC, pages 546-551, 2008.
    • (2008) DAC , pp. 546-551
    • Alkabani, Y.1    Koushanfar, F.2
  • 4
    • 34547623904 scopus 로고    scopus 로고
    • Physically unclonable function-based security and privacy in RFID systems
    • L. Bolotnyy and G. Robins. Physically unclonable function-based security and privacy in RFID systems. In PERCOM, pages 211-220, 2007.
    • (2007) PERCOM , pp. 211-220
    • Bolotnyy, L.1    Robins, G.2
  • 5
    • 0038341105 scopus 로고    scopus 로고
    • Silicon physical random functions
    • B. Gassend et al. Silicon physical random functions. In CCS, pages 148-160, 2002.
    • (2002) CCS , pp. 148-160
    • Gassend, B.1
  • 6
    • 4344587804 scopus 로고    scopus 로고
    • Identification and authentication of integrated circuits
    • John Wiley & Sons
    • B. Gassend et al. Identification and authentication of integrated circuits. Concurrency and Computation: Practice and Experience. John Wiley & Sons, 16(11): 1077-1098, 2004.
    • (2004) Concurrency and Computation: Practice and Experience , vol.16 , Issue.11 , pp. 1077-1098
    • Gassend, B.1
  • 7
    • 38049015807 scopus 로고    scopus 로고
    • FPGA intrinsic PUFs and their use for IP protection
    • J. Guajardo et al. FPGA intrinsic PUFs and their use for IP protection. In CHES, pages 63-80, 2007.
    • (2007) CHES , pp. 63-80
    • Guajardo, J.1
  • 8
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication applications
    • J.W. Lee et al. A technique to build a secret key in integrated circuits for identification and authentication applications. In Symposium of VLSI Circuits, pages 176-179, 2004.
    • (2004) Symposium of VLSI Circuits , pp. 176-179
    • Lee, J.W.1
  • 9
    • 49749144533 scopus 로고    scopus 로고
    • Remote activation of ICs for piracy prevention and digital right management
    • Y. Alkabani et al. Remote activation of ICs for piracy prevention and digital right management. In ICCAD, pages 674-677, 2007.
    • (2007) ICCAD , pp. 674-677
    • Alkabani, Y.1
  • 10
    • 33845429016 scopus 로고    scopus 로고
    • A case against currently used hash functions in RFID protocols
    • M. Feldhofer and C. Rechberger. A case against currently used hash functions in RFID protocols. In Workshop on RFID Security, pages 372-381, 2006.
    • (2006) Workshop on RFID Security , pp. 372-381
    • Feldhofer, M.1    Rechberger, C.2
  • 11
    • 34547252533 scopus 로고    scopus 로고
    • F. Koushanfar and M. Potkonjak. Cad-based security, cryptography, and digital rights management. In DAC, 2007.
    • F. Koushanfar and M. Potkonjak. Cad-based security, cryptography, and digital rights management. In DAC, 2007.
  • 12
    • 57849084599 scopus 로고    scopus 로고
    • M. Majzoobi, F. Koushanfar, and M. Potkonjak. Lightweight secure puf design for embedded systems. In Technical report - TREE0803, 2008.
    • M. Majzoobi, F. Koushanfar, and M. Potkonjak. Lightweight secure puf design for embedded systems. In Technical report - TREE0803, 2008.
  • 13
    • 67249147207 scopus 로고    scopus 로고
    • M. Majzoobi, F. Koushanfar, and M. Potkonjak. Testing techniques for hardware security. In ITC, 2008.
    • M. Majzoobi, F. Koushanfar, and M. Potkonjak. Testing techniques for hardware security. In ITC, 2008.
  • 14
    • 43749112190 scopus 로고    scopus 로고
    • Within-die delay variability in 90nm FPGAs and beyond
    • P. Sedcole and P. Y. K. Cheung. Within-die delay variability in 90nm FPGAs and beyond. In FPT, pages 97-104, 2006.
    • (2006) FPT , pp. 97-104
    • Sedcole, P.1    Cheung, P.Y.K.2
  • 15
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • G. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. In DAC, pages 9-14, 2007.
    • (2007) DAC , pp. 9-14
    • Suh, G.1    Devadas, S.2
  • 16
    • 34547294309 scopus 로고    scopus 로고
    • Trusted design in FPGAs
    • S. Trimberger. Trusted design in FPGAs. In DAC, pages 5-8, 2007.
    • (2007) DAC , pp. 5-8
    • Trimberger, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.