메뉴 건너뛰기




Volumn 6101 LNCS, Issue , 2010, Pages 290-297

The PUF promise

Author keywords

[No Author keywords available]

Indexed keywords

CHIPSET; MANUFACTURING VARIATION; PHYSICAL BEHAVIORS; PHYSICAL UNCLONEABLE FUNCTIONS; SECURITY ASSURANCE; SOFTWARE LICENSING;

EID: 77954703388     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13869-0_21     Document Type: Conference Paper
Times cited : (15)

References (37)
  • 1
    • 70349252061 scopus 로고    scopus 로고
    • Binding software to specific native hardware in a vm environment: The puf challenge and opportunity
    • ACM, New York
    • Atallah, M.J., Bryant, E., Korb, J.T., Rice, J.R.: Binding software to specific native hardware in a vm environment: the puf challenge and opportunity. In: VMSec, pp. 45-48. ACM, New York (2008)
    • (2008) VMSec , pp. 45-48
    • Atallah, M.J.1    Bryant, E.2    Korb, J.T.3    Rice, J.R.4
  • 3
    • 34547623904 scopus 로고    scopus 로고
    • Physically unclonable function-based security and privacy in rfid systems
    • IEEE Computer Society, Los Alamitos
    • Bolotnyy, L., Robins, G.: Physically unclonable function-based security and privacy in rfid systems. In: PerCom, pp. 211-220. IEEE Computer Society, Los Alamitos (2007)
    • (2007) PerCom , pp. 211-220
    • Bolotnyy, L.1    Robins, G.2
  • 5
    • 76649139469 scopus 로고    scopus 로고
    • Puf-based authentication protocols - Revisited
    • Youm, H.Y., Yung, M. (eds.) WISA 2009. Springer, Heidelberg
    • Busch, H., Katzenbeisser, S., Baecher, P.: Puf-based authentication protocols - revisited. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 296-308. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5932 , pp. 296-308
    • Busch, H.1    Katzenbeisser, S.2    Baecher, P.3
  • 6
    • 0033725717 scopus 로고    scopus 로고
    • Closing the gap between asic and custom: An asic perspective
    • Chinnery, D.G., Keutzer, K.: Closing the gap between asic and custom: an asic perspective. In: DAC, pp. 637-642 (2000)
    • (2000) DAC , pp. 637-642
    • Chinnery, D.G.1    Keutzer, K.2
  • 8
    • 70350407160 scopus 로고    scopus 로고
    • Robust authentication using physically unclonable functions
    • Springer, Heidelberg
    • Frikken, K.B., Blanton, M., Atallah, M.J.: Robust authentication using physically unclonable functions. In: ISC, pp. 262-277. Springer, Heidelberg (2009)
    • (2009) ISC , pp. 262-277
    • Frikken, K.B.1    Blanton, M.2    Atallah, M.J.3
  • 10
    • 0037999043 scopus 로고    scopus 로고
    • Delay-based circuit authentication and applications
    • ACM, New York
    • Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Delay-based circuit authentication and applications. In: SAC, pp. 294-301. ACM, New York (2003)
    • (2003) SAC , pp. 294-301
    • Gassend, B.1    Clarke, D.E.2    Van Dijk, M.3    Devadas, S.4
  • 12
    • 4344584084 scopus 로고    scopus 로고
    • Master thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology
    • Gassend, B.L.P.: Physical random functions.Master thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology (2003)
    • (2003) Physical Random Functions
    • Gassend, B.L.P.1
  • 13
    • 70449451246 scopus 로고    scopus 로고
    • A flexible design flow for software ip binding in commodity fpga
    • Gora, M., Maiti, A., Schaumont, P.: A flexible design flow for software ip binding in commodity fpga. In: SIES 2009, pp. 211-218 (2009)
    • (2009) SIES 2009 , pp. 211-218
    • Gora, M.1    Maiti, A.2    Schaumont, P.3
  • 14
    • 38049015807 scopus 로고    scopus 로고
    • Fpga intrinsic pufs and their use for ip protection
    • Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
    • Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: Fpga intrinsic pufs and their use for ip protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4727 , pp. 63-80
    • Guajardo, J.1    Kumar, S.S.2    Schrijen, G.J.3    Tuyls, P.4
  • 15
    • 51749089495 scopus 로고    scopus 로고
    • Brand and ip protection with physical unclonable functions
    • IEEE, Los Alamitos
    • Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: Brand and ip protection with physical unclonable functions. In: ISCAS, pp. 3186-3189. IEEE, Los Alamitos (2008)
    • (2008) ISCAS , pp. 3186-3189
    • Guajardo, J.1    Kumar, S.S.2    Schrijen, G.J.3    Tuyls, P.4
  • 16
    • 45749153036 scopus 로고    scopus 로고
    • Puf-hb: A tamper-resilient hb based authentication protocol
    • Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. Springer, Heidelberg
    • Hammouri, G., Sunar, B.: Puf-hb: A tamper-resilient hb based authentication protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 346-365. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5037 , pp. 346-365
    • Hammouri, G.1    Sunar, B.2
  • 18
    • 51849144293 scopus 로고    scopus 로고
    • The butterfly puf: Protecting ip on every fpga
    • IEEE Computer Society, Los Alamitos
    • Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.J., Tuyls, P.: The butterfly puf: Protecting ip on every fpga. In: HOST, pp. 67-70. IEEE Computer Society, Los Alamitos (2008)
    • (2008) HOST , pp. 67-70
    • Kumar, S.S.1    Guajardo, J.2    Maes, R.3    Schrijen, G.J.4    Tuyls, P.5
  • 19
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication applications
    • IEEE Press, Los Alamitos
    • Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk,M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proc. of the IEEE VLSI Circuits Symposium, pp. 176-179. IEEE Press, Los Alamitos (2004)
    • (2004) Proc. of the IEEE VLSI Circuits Symposium , pp. 176-179
    • Lee, J.W.1    Lim, D.2    Gassend, B.3    Suh, G.E.4    Van Dijk, M.5    Devadas, S.6
  • 20
    • 84949023663 scopus 로고
    • Secret-key agreement without public-key cryptography
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Leighton, F.T.,Micali, S.: Secret-key agreement without public-key cryptography. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 456-479. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 456-479
    • Leighton, F.T.1    Micali, S.2
  • 22
    • 20044382924 scopus 로고    scopus 로고
    • Master thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology
    • Lim, D.: Extracting secret keys from integrated circuits. Master thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology (2004)
    • (2004) Extracting Secret Keys from Integrated Circuits
    • Lim, D.1
  • 23
    • 3242749566 scopus 로고    scopus 로고
    • Phd thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology March
    • Pappu, R.S.: Physical One-Way Functions. Phd thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology (March 2001)
    • (2001) Physical One-Way Functions
    • Pappu, R.S.1
  • 25
    • 0009553549 scopus 로고    scopus 로고
    • Protecting devices by active coating
    • Posch, R.: Protecting devices by active coating. J. UCS 4(7), 652-668 (1998)
    • (1998) J. UCS , vol.4 , Issue.7 , pp. 652-668
    • Posch, R.1
  • 26
    • 33750702480 scopus 로고    scopus 로고
    • Offline hardware/software authentication for reconfigurable platforms
    • Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
    • Simpson, E., Schaumont, P.: Offline hardware/software authentication for reconfigurable platforms. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 311-323. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4249 , pp. 311-323
    • Simpson, E.1    Schaumont, P.2
  • 27
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • IEEE, Los Alamitos
    • Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: DAC, pp. 9-14. IEEE, Los Alamitos (2007)
    • (2007) DAC , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 29
    • 27544441530 scopus 로고    scopus 로고
    • Design and implementation of the aegis single-chip secure processor using physical random functions
    • IEEE Computer Society, Los Alamitos
    • Suh, G.E., O'Donnell, C.W., Sachdev, I., Devadas, S.: Design and implementation of the aegis single-chip secure processor using physical random functions. In: ISCA, pp. 25-36. IEEE Computer Society, Los Alamitos (2005)
    • (2005) ISCA , pp. 25-36
    • Suh, G.E.1    O'Donnell, C.W.2    Sachdev, I.3    Devadas, S.4
  • 30
    • 84958678364 scopus 로고    scopus 로고
    • An evolved circuit, intrinsic in silicon, entwined with physics
    • Higuchi, T., Iwata, M., Weixin, L. (eds.) ICES 1996. Springer, Heidelberg
    • Thompson, A.: An evolved circuit, intrinsic in silicon, entwined with physics. In: Higuchi, T., Iwata, M., Weixin, L. (eds.) ICES 1996. LNCS, vol. 1259, pp. 390-405. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1259 , pp. 390-405
    • Thompson, A.1
  • 31
    • 33750726983 scopus 로고    scopus 로고
    • Read-proof hardware from protective coatings
    • Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
    • Tuyls, P., Schrijen, G.J., Skoric, B., van Geloven, J., Verhaegh, N.,Wolters, R.: Read-proof hardware from protective coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4249 , pp. 369-383
    • Tuyls, P.1    Schrijen, G.J.2    Skoric, B.3    Van Geloven, J.4    Verhaegh, N.5    Wolters, R.6
  • 33
    • 26444487655 scopus 로고    scopus 로고
    • Information-theoretic security analysis of physical uncloneable functions
    • S. Patrick, A., Yung, M. (eds.) FC 2005. Springer, Heidelberg
    • Tuyls, P., Škorić, B., Stallinga, S., Akkermans, A.H.M., Ophey, W.: Information-theoretic security analysis of physical uncloneable functions. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 141-155. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3570 , pp. 141-155
    • Tuyls, P.1    Škorić, B.2    Stallinga, S.3    Akkermans, A.H.M.4    Ophey, W.5
  • 35
    • 26444544536 scopus 로고    scopus 로고
    • Robust key extraction from physical unclonable functions
    • Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
    • Škorić, B., Tuyls, P., Ophey, W.: Robust key extraction from physical unclonable functions. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407-422. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3531 , pp. 407-422
    • Škorić, B.1    Tuyls, P.2    Ophey, W.3
  • 36
    • 77954736560 scopus 로고    scopus 로고
    • Verayo, http://www.verayo.com
  • 37
    • 77954715859 scopus 로고    scopus 로고
    • IntrinsicID, http://www.intrinsic-id.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.