-
1
-
-
51349134046
-
S3PR: Secure Serverless Search Protocols for RFID
-
S.I. Ahamed, F. Rahman, E. Hoque, F. Kawsar and T. Nakajima, "S3PR: Secure Serverless Search Protocols for RFID", in Information Security and Assurance (ISA), 2008.
-
(2008)
Information Security and Assurance (ISA)
-
-
Ahamed, S.I.1
Rahman, F.2
Hoque, E.3
Kawsar, F.4
Nakajima, T.5
-
2
-
-
51849144293
-
Extended Abstract: The Butterfly PUF Protecting IP on every FPGA
-
June
-
S. Kumar, J Guajardo et al., "Extended Abstract: The Butterfly PUF Protecting IP on every FPGA" , in Hardware-Oriented Security and Trust (HOST) , pp.67-70, June 2008.
-
(2008)
Hardware-Oriented Security and Trust (HOST)
, pp. 67-70
-
-
Kumar, S.1
Guajardo, J.2
-
3
-
-
51749083449
-
Physical unclonable function with tristate buffers
-
May
-
E. Ozturk, G. Hammouri, B. Sunar, "Physical unclonable function with tristate buffers" , in Circuits and Systems (ISCAS), pp.3194-3197, May 2008.
-
(2008)
Circuits and Systems (ISCAS)
, pp. 3194-3197
-
-
Ozturk, E.1
Hammouri, G.2
Sunar, B.3
-
4
-
-
33745181952
-
Authenticating Pervasive Devices with Human Protocols
-
A. Juels, S. A. Weis, "Authenticating Pervasive Devices with Human Protocols" , in Advances in Cryptology (CRYPTO), pp. 293-308, 2005.
-
(2005)
Advances in Cryptology (CRYPTO)
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
6
-
-
70350220394
-
Statistical Analysis of Silicon PUF responses for Device Identification
-
R. Maes, P. Tuyls, and I. Verbauwhede, "Statistical Analysis of Silicon PUF responses for Device Identification" , in SECSI Workshop, 2008.
-
(2008)
SECSI Workshop
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
7
-
-
34547635774
-
Serverless Search and Authentication Protocols for RFID
-
Chiu C. Tan, Bo Sheng, and Qun Li, "Serverless Search and Authentication Protocols for RFID" , in IEEE Percom, pages 3-12, 2007.
-
(2007)
IEEE Percom
, pp. 3-12
-
-
Tan, C.C.1
Sheng, B.2
Li, Q.3
-
9
-
-
34547307341
-
Physical Unclonable Functions for Device Authentication and Secret Key Generation
-
G. E. Suh, S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation" , in Design Automation Conference - DAC 2007, 2007.
-
(2007)
Design Automation Conference - DAC 2007
-
-
Suh, G.E.1
Devadas, S.2
-
10
-
-
51049092732
-
Hash Functions and RFID Tags : Mind The Gap
-
Proceedings of the 10th International Workshop Cryptographic Hardware and Embedded Systems CHES 2008
-
Bogdanov, Andrey and Leander, Gregor and Paar, Christof and Poschmann, Axel and Robshaw, Matt J.B. and Seurin, Yannick, "Hash Functions and RFID Tags : Mind The Gap", in Proceedings of the 10th International Workshop Cryptographic Hardware and Embedded Systems (CHES 2008), LNCS, vol. 5154, 2008.
-
(2008)
LNCS
, vol.5154
-
-
Bogdanov, A.1
Leander, G.2
Paar, C.3
Poschmann, A.4
Robshaw, M.J.B.5
Seurin, Y.6
-
12
-
-
79957568621
-
-
technical Reports, University of Otago, New Zealand
-
R. Ward, T. Molteno, "Table of Linear Feedback Shift Registers", http://www.physics.otago.ac.nz/px/research/electronics/ papers/technical-reports/lfsr-table.pdf, technical Reports, University of Otago, New Zealand.
-
Table of Linear Feedback Shift Registers
-
-
Ward, R.1
Molteno, T.2
-
13
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
C. Shannon, "Communication Theory of Secrecy Systems", in Bell System Technical Journal, vol. 28(4), pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.1
|