메뉴 건너뛰기




Volumn 5932 LNCS, Issue , 2009, Pages 296-308

PUF-based authentication protocols - Revisited

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION PROTOCOLS; NEW MODEL; PHYSICAL OBJECTS; PHYSICAL UNCLONABLE FUNCTIONS; SHORT PERIODS;

EID: 76649139469     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10838-9_22     Document Type: Conference Paper
Times cited : (20)

References (16)
  • 1
    • 3242749566 scopus 로고    scopus 로고
    • PhD thesis, Massachusetts Institute of Technology
    • Pappu, R.: Physical One-Way Functions. PhD thesis, Massachusetts Institute of Technology (2001)
    • (2001) Physical One-Way Functions
    • Pappu, R.1
  • 2
    • 0037144430 scopus 로고    scopus 로고
    • Physical one-way functions
    • Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026-2030 (2002)
    • (2002) Science , vol.297 , Issue.5589 , pp. 2026-2030
    • Pappu, R.1    Recht, B.2    Taylor, J.3    Gershenfeld, N.4
  • 3
    • 4344584084 scopus 로고    scopus 로고
    • Master's thesis, Massachusetts Institute of Technology
    • Gassend, B.: Physical random functions. Master's thesis, Massachusetts Institute of Technology (2003)
    • (2003) Physical random functions
    • Gassend, B.1
  • 4
    • 45749153036 scopus 로고    scopus 로고
    • Hammouri, G., Sunar, B.: PUF-HB: A tamper-resilient HB based authentication protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, 5037, pp. 346-365. Springer, Heidelberg (2008)
    • Hammouri, G., Sunar, B.: PUF-HB: A tamper-resilient HB based authentication protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 346-365. Springer, Heidelberg (2008)
  • 5
    • 26444487655 scopus 로고    scopus 로고
    • Tuyls, P., et al.: Information-theoretic security analysis of physical uncloneable functions. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 141-155. Springer, Heidelberg (2005)
    • Tuyls, P., et al.: Information-theoretic security analysis of physical uncloneable functions. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 141-155. Springer, Heidelberg (2005)
  • 8
    • 38049015807 scopus 로고    scopus 로고
    • Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, 4727, pp. 63-80. Springer, Heidelberg (2007)
    • Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
  • 9
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13(7), 422-426 (1970)
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 10
    • 70450232823 scopus 로고    scopus 로고
    • Network applications of bloom filters: A survey
    • Broder, A., Mitzenmacher, M.: Network applications of bloom filters: A survey. Internet Mathematics 1(4), 485-509 (2004)
    • (2004) Internet Mathematics , vol.1 , Issue.4 , pp. 485-509
    • Broder, A.1    Mitzenmacher, M.2
  • 12
  • 13
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 14
    • 26444544536 scopus 로고    scopus 로고
    • Škorić, B., Tuyls, P.: Robust key extraction from physical unclonable functions. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 407-422. Springer, Heidelberg (2005)
    • Škorić, B., Tuyls, P.: Robust key extraction from physical unclonable functions. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407-422. Springer, Heidelberg (2005)
  • 16
    • 84945120267 scopus 로고    scopus 로고
    • Min-round resettable zero knowledge in the public key model
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Micali, S., Reyzin, L.: Min-round resettable zero knowledge in the public key model. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 373-393. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 373-393
    • Micali, S.1    Reyzin, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.