-
1
-
-
3242749566
-
-
PhD thesis, Massachusetts Institute of Technology
-
Pappu, R.: Physical One-Way Functions. PhD thesis, Massachusetts Institute of Technology (2001)
-
(2001)
Physical One-Way Functions
-
-
Pappu, R.1
-
2
-
-
0037144430
-
Physical one-way functions
-
Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026-2030 (2002)
-
(2002)
Science
, vol.297
, Issue.5589
, pp. 2026-2030
-
-
Pappu, R.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
3
-
-
4344584084
-
-
Master's thesis, Massachusetts Institute of Technology
-
Gassend, B.: Physical random functions. Master's thesis, Massachusetts Institute of Technology (2003)
-
(2003)
Physical random functions
-
-
Gassend, B.1
-
4
-
-
45749153036
-
-
Hammouri, G., Sunar, B.: PUF-HB: A tamper-resilient HB based authentication protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, 5037, pp. 346-365. Springer, Heidelberg (2008)
-
Hammouri, G., Sunar, B.: PUF-HB: A tamper-resilient HB based authentication protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 346-365. Springer, Heidelberg (2008)
-
-
-
-
5
-
-
26444487655
-
-
Tuyls, P., et al.: Information-theoretic security analysis of physical uncloneable functions. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 141-155. Springer, Heidelberg (2005)
-
Tuyls, P., et al.: Information-theoretic security analysis of physical uncloneable functions. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 141-155. Springer, Heidelberg (2005)
-
-
-
-
7
-
-
76649124351
-
Strong Authentication with Physical Unclonable Functions
-
Springer, Heidelberg
-
Škorić, B., Tuyls, P.: Strong Authentication with Physical Unclonable Functions. In: Security, Privacy and Trust in Modern Data Management, pp. 133-148. Springer, Heidelberg (2007)
-
(2007)
Security, Privacy and Trust in Modern Data Management
, pp. 133-148
-
-
Škorić, B.1
Tuyls, P.2
-
8
-
-
38049015807
-
-
Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, 4727, pp. 63-80. Springer, Heidelberg (2007)
-
Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
-
-
-
-
9
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13(7), 422-426 (1970)
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
10
-
-
70450232823
-
Network applications of bloom filters: A survey
-
Broder, A., Mitzenmacher, M.: Network applications of bloom filters: A survey. Internet Mathematics 1(4), 485-509 (2004)
-
(2004)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
12
-
-
62449274873
-
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
-
Guajardo, J., Škorić, B., Tuyls, P., Kumar, S.S., Bel, T., Blom, A.H., Schrijen, G.J.: Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions. Information Systems Frontiers 11(1), 19-41 (2009)
-
(2009)
Information Systems Frontiers
, vol.11
, Issue.1
, pp. 19-41
-
-
Guajardo, J.1
Škorić, B.2
Tuyls, P.3
Kumar, S.S.4
Bel, T.5
Blom, A.H.6
Schrijen, G.J.7
-
13
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
14
-
-
26444544536
-
-
Škorić, B., Tuyls, P.: Robust key extraction from physical unclonable functions. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 407-422. Springer, Heidelberg (2005)
-
Škorić, B., Tuyls, P.: Robust key extraction from physical unclonable functions. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407-422. Springer, Heidelberg (2005)
-
-
-
-
16
-
-
84945120267
-
Min-round resettable zero knowledge in the public key model
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Micali, S., Reyzin, L.: Min-round resettable zero knowledge in the public key model. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 373-393. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 373-393
-
-
Micali, S.1
Reyzin, L.2
|