메뉴 건너뛰기




Volumn , Issue , 2009, Pages 676-681

A physical unclonable function defined using power distribution system equivalent resistance variations

Author keywords

Hardware security; Process variations; Unique identifier

Indexed keywords

COMPUTER AIDED DESIGN; HARDWARE SECURITY;

EID: 70350741520     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1629911.1630089     Document Type: Conference Paper
Times cited : (91)

References (24)
  • 4
    • 34547307341 scopus 로고    scopus 로고
    • Physical Unclonable Functions for Device Authentication and Secret Key Generation
    • G. E. Suh and S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation", Proc. Design Automation Conference, 2007, pp. 9-14.
    • (2007) Proc. Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 10
    • 57549098771 scopus 로고    scopus 로고
    • Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach
    • Y. Alkabani and F. Koushanfar and N. Kiyavash and M. Potkonjak, "Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach," Information Hiding, 2008.
    • (2008) Information Hiding
    • Alkabani, Y.1    Koushanfar, F.2    Kiyavash, N.3    Potkonjak, M.4
  • 11
    • 70350703522 scopus 로고    scopus 로고
    • Measuring Power Distribution System Resistance Variations for Application to Design for Manufacturability and Physical Unclonable Functions,
    • M.S. thesis, University of Maryland, Baltimore Co, July
    • R. Helinski, "Measuring Power Distribution System Resistance Variations for Application to Design for Manufacturability and Physical Unclonable Functions," M.S. thesis, University of Maryland, Baltimore Co., July, 2008.
    • (2008)
    • Helinski, R.1
  • 12
    • 49249126959 scopus 로고    scopus 로고
    • Measuring Power Distribution System Resistance Variations
    • Aug
    • R. Helinski, J. Plusquellic, "Measuring Power Distribution System Resistance Variations," Transactions on Semiconductor Manufacturing, Volume 21, Issue 3, pp. 444-453, Aug. 2008.
    • (2008) Transactions on Semiconductor Manufacturing , vol.21 , Issue.3 , pp. 444-453
    • Helinski, R.1    Plusquellic, J.2
  • 13
    • 0041663673 scopus 로고    scopus 로고
    • An Artificial Fingerprint Device (AFD): A Study of Identification Number Applications Utilizing Characteristics Variation of Polycrystalline Silicon TFTs
    • June
    • S. Maeda and H. Kuriyama and T. Ipposhi and S. Maegawa and Y. Inoue and M. Inuishi and N. Kotani and T. Nishimura, "An Artificial Fingerprint Device (AFD): a Study of Identification Number Applications Utilizing Characteristics Variation of Polycrystalline Silicon TFTs," Trans. on Electron Devices, number 50, issue 6, June, 2003, pp.1451- 1458.
    • (2003) Trans. on Electron Devices , vol.6 , Issue.50 and , pp. 1451-1458
    • Maeda, S.1    Kuriyama, H.2    Ipposhi, T.3    Maegawa, S.4    Inoue, Y.5    Inuishi, M.6    Kotani, N.7    Nishimura, T.8
  • 16
    • 70350729562 scopus 로고    scopus 로고
    • Offline Hardware/Software Authentication for Reconfigurable Platforms
    • Oct
    • E. Simpson and P. Schaumont, "Offline Hardware/Software Authentication for Reconfigurable Platforms," Cryptographic Hardware and Embedded Systems, Volume 4249, Oct., 2006, pp. 10-13.
    • (2006) Cryptographic Hardware and Embedded Systems , vol.4249 , pp. 10-13
    • Simpson, E.1    Schaumont, P.2
  • 18
    • 70350722483 scopus 로고    scopus 로고
    • S. S. Kumar and J. Guajardo and R. Maes and Geert-Jan Schrijen and P. Tuyls, Extended Abstract: The Butterfly PUF Protecting IP on Every FPGA, Proc. of IEEE International Workshop on Hardware-Oriented Security and Trust, 2008, pp. 70-73.
    • S. S. Kumar and J. Guajardo and R. Maes and Geert-Jan Schrijen and P. Tuyls, "Extended Abstract: The Butterfly PUF Protecting IP on Every FPGA," Proc. of IEEE International Workshop on Hardware-Oriented Security and Trust, 2008, pp. 70-73.
  • 22
    • 51849099113 scopus 로고    scopus 로고
    • At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection
    • J. Li and J. Lach, "At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection," Workshop on Hardware-Oriented Security and Trust, 2008, 8-14.
    • (2008) Workshop on Hardware-Oriented Security and Trust , pp. 8-14
    • Li, J.1    Lach, J.2
  • 24
    • 33751081854 scopus 로고    scopus 로고
    • A Low-Cost Solution for Protecting IPs against Scan-Based Side-Channel Attacks
    • May
    • J. Lee, M. Tehranipoor, J. Plusquellic, "A Low-Cost Solution for Protecting IPs against Scan-Based Side-Channel Attacks," Proc. VLSI Test Symposium, May 2006, pp. 42-47.
    • (2006) Proc. VLSI Test Symposium , pp. 42-47
    • Lee, J.1    Tehranipoor, M.2    Plusquellic, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.