메뉴 건너뛰기




Volumn 5461, Issue , 2009, Pages 235-252

Novel PUF-based error detection methods in finite state machines

Author keywords

Adversarial faults; Fault resilience; PUF; State machines

Indexed keywords

ADVERSARIAL-FAULTS; DETECTION METHODS; FAULT INJECTION; FAULT-RESILIENCE; FINITE STATE MACHINES; LOGICAL LEVELS; PHYSICAL LEVEL; PROPOSED ARCHITECTURES; PUF; SECRET INFORMATION; SECRET KEY; SECURITY MECHANISM; STATE MACHINE; STATE-MACHINES;

EID: 67049156799     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00730-9_15     Document Type: Conference Paper
Times cited : (5)

References (42)
  • 1
    • 67049092199 scopus 로고    scopus 로고
    • Agmon, S.: The relaxation method for linear inequalities. Canadian J. of Mathematics, 382-392 (1964)
    • Agmon, S.: The relaxation method for linear inequalities. Canadian J. of Mathematics, 382-392 (1964)
  • 5
    • 36849077064 scopus 로고    scopus 로고
    • Fault tolerant design techniques for asynchronous single event upsets within synchronous finite state machine architectures
    • NASA September
    • Berg, M.: Fault tolerant design techniques for asynchronous single event upsets within synchronous finite state machine architectures. In: 7th International Military and Aerospace Programmable Logic Devices (MAPLD) Conference. NASA (September 2004)
    • (2004) 7th International Military and Aerospace Programmable Logic Devices (MAPLD) Conference
    • Berg, M.1
  • 6
    • 0037624935 scopus 로고    scopus 로고
    • Error analysis and detection procedures for a hardware implementation of the advanced encryption standard
    • Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Transactions on Computers 52(4), 492-505 (2003)
    • (2003) IEEE Transactions on Computers , vol.52 , Issue.4 , pp. 492-505
    • Bertoni, G.1    Breveglieri, L.2    Koren, I.3    Maistri, P.4    Piuri, V.5
  • 7
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513-525. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 8
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
    • Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37-51. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 11
    • 33845269365 scopus 로고    scopus 로고
    • Gaubatz, G., Sunar, B., Karpovsky, M.G.: Non-linear residue codes for robust public-key arithmetic. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, 4236, pp. 173-184. Springer, Heidelberg (2006)
    • Gaubatz, G., Sunar, B., Karpovsky, M.G.: Non-linear residue codes for robust public-key arithmetic. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 173-184. Springer, Heidelberg (2006)
  • 12
    • 36849047668 scopus 로고    scopus 로고
    • Robust finite field arithmetic for fault-tolerant public-key cryptography
    • Breveglieri, L, Koren, I, eds, September
    • Gaubatz, G., Sunar, B.: Robust finite field arithmetic for fault-tolerant public-key cryptography. In: Breveglieri, L., Koren, I. (eds.) 2nd Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2005 (September 2005)
    • (2005) 2nd Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC
    • Gaubatz, G.1    Sunar, B.2
  • 13
    • 36849018417 scopus 로고    scopus 로고
    • Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults
    • Gaubatz, G., Sunar, B., Savas, E.: Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults. IEEE Transactions on Computers 57(1), 126-138 (2008)
    • (2008) IEEE Transactions on Computers , vol.57 , Issue.1 , pp. 126-138
    • Gaubatz, G.1    Sunar, B.2    Savas, E.3
  • 14
    • 38049015807 scopus 로고    scopus 로고
    • Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic pUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, 4727, pp. 63-80. Springer, Heidelberg (2007)
    • Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic pUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
  • 15
    • 67049139425 scopus 로고    scopus 로고
    • Hammouri, G, Ozturk, E, Sunar, B, A Tamper-Proof, Lightweight and Secure Authentication Scheme under review
    • Hammouri, G., Ozturk, E., Sunar, B.: A Tamper-Proof, Lightweight and Secure Authentication Scheme (under review)
  • 16
    • 45749153036 scopus 로고    scopus 로고
    • Hammouri, G., Sunar, B.: PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, 5037, pp. 346-365. Springer, Heidelberg (2008)
    • Hammouri, G., Sunar, B.: PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 346-365. Springer, Heidelberg (2008)
  • 17
    • 38049090584 scopus 로고    scopus 로고
    • Joye, M.: Highly Regular Right-to-Left Algorithms for Scalar Multiplication. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, 4727, p. 135. Springer, Heidelberg (2007)
    • Joye, M.: Highly Regular Right-to-Left Algorithms for Scalar Multiplication. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, p. 135. Springer, Heidelberg (2007)
  • 19
    • 33845209099 scopus 로고    scopus 로고
    • Differential fault analysis attack resistant architectures for the advanced encryption standard
    • Karpovsky, M., Kulikowski, K.J., Taubin, A.: Differential fault analysis attack resistant architectures for the advanced encryption standard. In: Proc. World Computing Congress (2004)
    • (2004) Proc. World Computing Congress
    • Karpovsky, M.1    Kulikowski, K.J.2    Taubin, A.3
  • 20
    • 4544294542 scopus 로고    scopus 로고
    • Robust protection against fault- injection attacks on smart cards implementing the advanced encryption standard
    • Washington, DC, USA, p, IEEE Computer Society Press, Los Alamitos
    • Karpovsky, M., Kulikowski, K.J., Taubin, A.: Robust protection against fault- injection attacks on smart cards implementing the advanced encryption standard. In: DSN 2004: Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), Washington, DC, USA, p. 93. IEEE Computer Society Press, Los Alamitos (2004)
    • (2004) DSN 2004: Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN , pp. 93
    • Karpovsky, M.1    Kulikowski, K.J.2    Taubin, A.3
  • 21
    • 3943069113 scopus 로고    scopus 로고
    • A new class of nonlinear systematic error detecting codes
    • Karpovsky, M., Taubin, A.: A new class of nonlinear systematic error detecting codes. IEEE Trans. Info. Theory 50(8), 1818-1820 (2004)
    • (2004) IEEE Trans. Info. Theory , vol.50 , Issue.8 , pp. 1818-1820
    • Karpovsky, M.1    Taubin, A.2
  • 23
    • 84868982866 scopus 로고    scopus 로고
    • Estimation of keys stored in cmos cryptographic device after baking by using the charge shift. Cryptology ePrint Archive
    • Report 2007/134
    • Kocar, O.: Estimation of keys stored in cmos cryptographic device after baking by using the charge shift. Cryptology ePrint Archive, Report 2007/134 (2007), http://eprint.iacr.org/
    • (2007)
    • Kocar, O.1
  • 25
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 28
    • 33845187887 scopus 로고    scopus 로고
    • Kulikowski, K.J., Karpovsky, M., Taubin, A.: Fault attack resistant cryptographic hardware with uniform error detection. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, 4236, pp. 185-195. Springer, Heidelberg (2006)
    • Kulikowski, K.J., Karpovsky, M., Taubin, A.: Fault attack resistant cryptographic hardware with uniform error detection. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 185-195. Springer, Heidelberg (2006)
  • 29
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication applications
    • Lee, J.W., Daihyun, L., Gassend, B., Suhamd, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium of VLSI Circuits, pp. 176-179 (2004)
    • (2004) Symposium of VLSI Circuits , pp. 176-179
    • Lee, J.W.1    Daihyun, L.2    Gassend, B.3    Suhamd, G.E.4    van Dijk, M.5    Devadas, S.6
  • 33
    • 0009553549 scopus 로고    scopus 로고
    • Protecting Devices by Active Coating
    • Posch, R.: Protecting Devices by Active Coating. Journal of Universal Computer Science 4(7), 652-668 (1998)
    • (1998) Journal of Universal Computer Science , vol.4 , Issue.7 , pp. 652-668
    • Posch, R.1
  • 34
    • 0037952426 scopus 로고    scopus 로고
    • PhD thesis, Massachusetts Institute Of Technology
    • Ravikanth, P.S.: Physical One-Way Functions. PhD thesis, Massachusetts Institute Of Technology (2001)
    • (2001) Physical One-Way Functions
    • Ravikanth, P.S.1
  • 37
    • 49149114201 scopus 로고    scopus 로고
    • Information-theoretic Analysis of Coating PUFs. Cryptology ePrint Archive
    • Report 2006/101
    • Skoric, B., Maubach, S., Kevenaar, T., Tuyls, P.: Information-theoretic Analysis of Coating PUFs. Cryptology ePrint Archive, Report 2006/101 (2006)
    • (2006)
    • Skoric, B.1    Maubach, S.2    Kevenaar, T.3    Tuyls, P.4
  • 40
    • 33750726983 scopus 로고    scopus 로고
    • Tuyls, P., Schrijen, G.-J., Skorkc, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-proof hardware from protective coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 369-383. Springer, Heidelberg (2006)
    • Tuyls, P., Schrijen, G.-J., Skorkc, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-proof hardware from protective coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
  • 41
    • 34547674038 scopus 로고    scopus 로고
    • Secret Key Generation from Classical Physics: Physical Un- cloneable Functions
    • Mukherjee, S, Aarts, E, Roovers, R, Widdershoven, F, Ouwerkerk, M, eds, AmIware: Hardware Technology Drivers of Ambient Intelligence, Springer, Heidelberg
    • Tuyls, P., Skoric, B.: Secret Key Generation from Classical Physics: Physical Un- cloneable Functions. In: Mukherjee, S., Aarts, E., Roovers, R., Widdershoven, F., Ouwerkerk, M. (eds.) AmIware: Hardware Technology Drivers of Ambient Intelligence. Philips Research Book Series, vol. 5. Springer, Heidelberg (2006)
    • (2006) Philips Research Book Series , vol.5
    • Tuyls, P.1    Skoric, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.