-
1
-
-
70349252061
-
Binding software to specific native hardware in a vm environment: The puf challenge and opportunity
-
ACM, New York
-
Atallah, M.J., Bryant, E., Korb, J.T., Rice, J.R.: Binding software to specific native hardware in a vm environment: the puf challenge and opportunity. In: VMSec, pp. 45-48. ACM, New York (2008)
-
(2008)
VMSec
, pp. 45-48
-
-
Atallah, M.J.1
Bryant, E.2
Korb, J.T.3
Rice, J.R.4
-
3
-
-
34547623904
-
Physically unclonable function-based security and privacy in rfid systems
-
IEEE Computer Society, Los Alamitos
-
Bolotnyy, L., Robins, G.: Physically unclonable function-based security and privacy in rfid systems. In: PerCom, pp. 211-220. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
PerCom
, pp. 211-220
-
-
Bolotnyy, L.1
Robins, G.2
-
5
-
-
76649139469
-
Puf-based authentication protocols - Revisited
-
Youm, H.Y., Yung, M. (eds.) WISA 2009. Springer, Heidelberg
-
Busch, H., Katzenbeisser, S., Baecher, P.: Puf-based authentication protocols - revisited. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 296-308. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5932
, pp. 296-308
-
-
Busch, H.1
Katzenbeisser, S.2
Baecher, P.3
-
6
-
-
0033725717
-
Closing the gap between asic and custom: An asic perspective
-
Chinnery, D.G., Keutzer, K.: Closing the gap between asic and custom: an asic perspective. In: DAC, pp. 637-642 (2000)
-
(2000)
DAC
, pp. 637-642
-
-
Chinnery, D.G.1
Keutzer, K.2
-
7
-
-
52149117439
-
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data 38(1), 97-139 (2008)
-
(2008)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
8
-
-
70350407160
-
Robust authentication using physically unclonable functions
-
Springer, Heidelberg
-
Frikken, K.B., Blanton, M., Atallah, M.J.: Robust authentication using physically unclonable functions. In: ISC, pp. 262-277. Springer, Heidelberg (2009)
-
(2009)
ISC
, pp. 262-277
-
-
Frikken, K.B.1
Blanton, M.2
Atallah, M.J.3
-
9
-
-
0038341105
-
Silicon physical random functions
-
Atluri, V. (ed.) ACM, New York
-
Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Silicon physical random functions. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security, pp. 148-160. ACM, New York (2002)
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.E.2
Van Dijk, M.3
Devadas, S.4
-
10
-
-
0037999043
-
Delay-based circuit authentication and applications
-
ACM, New York
-
Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Delay-based circuit authentication and applications. In: SAC, pp. 294-301. ACM, New York (2003)
-
(2003)
SAC
, pp. 294-301
-
-
Gassend, B.1
Clarke, D.E.2
Van Dijk, M.3
Devadas, S.4
-
11
-
-
4344587804
-
Identification and authentication of integrated circuits
-
Gassend, B., Lim, D., Clarke, D., Devadas, S., van Dijk, M.: Identification and authentication of integrated circuits. Concurrency and Computation: Practice and Experience 16(11), 1077-1098 (2004)
-
(2004)
Concurrency and Computation: Practice and Experience
, vol.16
, Issue.11
, pp. 1077-1098
-
-
Gassend, B.1
Lim, D.2
Clarke, D.3
Devadas, S.4
Van Dijk, M.5
-
12
-
-
4344584084
-
-
Master thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology
-
Gassend, B.L.P.: Physical random functions.Master thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology (2003)
-
(2003)
Physical Random Functions
-
-
Gassend, B.L.P.1
-
13
-
-
70449451246
-
A flexible design flow for software ip binding in commodity fpga
-
Gora, M., Maiti, A., Schaumont, P.: A flexible design flow for software ip binding in commodity fpga. In: SIES 2009, pp. 211-218 (2009)
-
(2009)
SIES 2009
, pp. 211-218
-
-
Gora, M.1
Maiti, A.2
Schaumont, P.3
-
14
-
-
38049015807
-
Fpga intrinsic pufs and their use for ip protection
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: Fpga intrinsic pufs and their use for ip protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
15
-
-
51749089495
-
Brand and ip protection with physical unclonable functions
-
IEEE, Los Alamitos
-
Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: Brand and ip protection with physical unclonable functions. In: ISCAS, pp. 3186-3189. IEEE, Los Alamitos (2008)
-
(2008)
ISCAS
, pp. 3186-3189
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
16
-
-
45749153036
-
Puf-hb: A tamper-resilient hb based authentication protocol
-
Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. Springer, Heidelberg
-
Hammouri, G., Sunar, B.: Puf-hb: A tamper-resilient hb based authentication protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 346-365. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5037
, pp. 346-365
-
-
Hammouri, G.1
Sunar, B.2
-
17
-
-
38049049008
-
Estimating the secrecy rate of physical uncloneable functions with the context-tree weighting method
-
IEEE Press, Los Alamitos
-
Ignatenko, T., Schrijen, G.-J., Škorić, B., Tuyls, P.,Willems, F.M.J.: Estimating the secrecy rate of physical uncloneable functions with the context-tree weighting method. In: Proc. IEEE International Symposium on Information Theory 2006, pp. 499-503. IEEE Press, Los Alamitos (2006)
-
(2006)
Proc. IEEE International Symposium on Information Theory 2006
, pp. 499-503
-
-
Ignatenko, T.1
Schrijen, G.-J.2
Škorić, B.3
Tuyls, P.4
Willems, F.M.J.5
-
18
-
-
51849144293
-
The butterfly puf: Protecting ip on every fpga
-
IEEE Computer Society, Los Alamitos
-
Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.J., Tuyls, P.: The butterfly puf: Protecting ip on every fpga. In: HOST, pp. 67-70. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
HOST
, pp. 67-70
-
-
Kumar, S.S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.J.4
Tuyls, P.5
-
19
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
IEEE Press, Los Alamitos
-
Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk,M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proc. of the IEEE VLSI Circuits Symposium, pp. 176-179. IEEE Press, Los Alamitos (2004)
-
(2004)
Proc. of the IEEE VLSI Circuits Symposium
, pp. 176-179
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
20
-
-
84949023663
-
Secret-key agreement without public-key cryptography
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Leighton, F.T.,Micali, S.: Secret-key agreement without public-key cryptography. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 456-479. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 456-479
-
-
Leighton, F.T.1
Micali, S.2
-
21
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
DOI 10.1109/TVLSI.2005.859470
-
Lim, D., Lee, J.W., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 13(10), 1200-1205 (2005) (Pubitemid 43131686)
-
(2005)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
22
-
-
20044382924
-
-
Master thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology
-
Lim, D.: Extracting secret keys from integrated circuits. Master thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology (2004)
-
(2004)
Extracting Secret Keys from Integrated Circuits
-
-
Lim, D.1
-
23
-
-
3242749566
-
-
Phd thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology March
-
Pappu, R.S.: Physical One-Way Functions. Phd thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology (March 2001)
-
(2001)
Physical One-Way Functions
-
-
Pappu, R.S.1
-
24
-
-
0037144430
-
Physical one-way functions
-
Pappu, R.S., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026-2030 (2002)
-
(2002)
Science
, vol.297
, Issue.5589
, pp. 2026-2030
-
-
Pappu, R.S.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
25
-
-
0009553549
-
Protecting devices by active coating
-
Posch, R.: Protecting devices by active coating. J. UCS 4(7), 652-668 (1998)
-
(1998)
J. UCS
, vol.4
, Issue.7
, pp. 652-668
-
-
Posch, R.1
-
26
-
-
33750702480
-
Offline hardware/software authentication for reconfigurable platforms
-
Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
-
Simpson, E., Schaumont, P.: Offline hardware/software authentication for reconfigurable platforms. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 311-323. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4249
, pp. 311-323
-
-
Simpson, E.1
Schaumont, P.2
-
27
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
IEEE, Los Alamitos
-
Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: DAC, pp. 9-14. IEEE, Los Alamitos (2007)
-
(2007)
DAC
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
28
-
-
37149044968
-
Aegis: A single-chip secure processor
-
Suh, G.E., O'Donnell, C.W., Devadas, S.: Aegis: A single-chip secure processor. IEEE Design & Test of Computers 24(6), 570-580 (2007)
-
(2007)
IEEE Design & Test of Computers
, vol.24
, Issue.6
, pp. 570-580
-
-
Suh, G.E.1
O'Donnell, C.W.2
Devadas, S.3
-
29
-
-
27544441530
-
Design and implementation of the aegis single-chip secure processor using physical random functions
-
IEEE Computer Society, Los Alamitos
-
Suh, G.E., O'Donnell, C.W., Sachdev, I., Devadas, S.: Design and implementation of the aegis single-chip secure processor using physical random functions. In: ISCA, pp. 25-36. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
ISCA
, pp. 25-36
-
-
Suh, G.E.1
O'Donnell, C.W.2
Sachdev, I.3
Devadas, S.4
-
30
-
-
84958678364
-
An evolved circuit, intrinsic in silicon, entwined with physics
-
Higuchi, T., Iwata, M., Weixin, L. (eds.) ICES 1996. Springer, Heidelberg
-
Thompson, A.: An evolved circuit, intrinsic in silicon, entwined with physics. In: Higuchi, T., Iwata, M., Weixin, L. (eds.) ICES 1996. LNCS, vol. 1259, pp. 390-405. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1259
, pp. 390-405
-
-
Thompson, A.1
-
31
-
-
33750726983
-
Read-proof hardware from protective coatings
-
Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
-
Tuyls, P., Schrijen, G.J., Skoric, B., van Geloven, J., Verhaegh, N.,Wolters, R.: Read-proof hardware from protective coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.J.2
Skoric, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
32
-
-
76649124351
-
Strong Authentication with Physical Unclonable Functions
-
Tuyls, P., Škorić, B.: Strong Authentication with Physical Unclonable Functions. In: Security, Privacy, and Trust in Modern Data Management, p. 133 (2007)
-
(2007)
Security, Privacy, and Trust in Modern Data Management
, pp. 133
-
-
Tuyls, P.1
Škorić, B.2
-
33
-
-
26444487655
-
Information-theoretic security analysis of physical uncloneable functions
-
S. Patrick, A., Yung, M. (eds.) FC 2005. Springer, Heidelberg
-
Tuyls, P., Škorić, B., Stallinga, S., Akkermans, A.H.M., Ophey, W.: Information-theoretic security analysis of physical uncloneable functions. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 141-155. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3570
, pp. 141-155
-
-
Tuyls, P.1
Škorić, B.2
Stallinga, S.3
Akkermans, A.H.M.4
Ophey, W.5
-
34
-
-
33746785063
-
Information-theoretic analysis of capacitive physical unclonable functions
-
Škorić, B., Maubach, S., Kevenaar, T., Tuyls, P.: Information-theoretic analysis of capacitive physical unclonable functions. Journal of Applied physics 100 (2006)
-
(2006)
Journal of Applied Physics
, pp. 100
-
-
Škorić, B.1
Maubach, S.2
Kevenaar, T.3
Tuyls, P.4
-
35
-
-
26444544536
-
Robust key extraction from physical unclonable functions
-
Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
-
Škorić, B., Tuyls, P., Ophey, W.: Robust key extraction from physical unclonable functions. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407-422. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3531
, pp. 407-422
-
-
Škorić, B.1
Tuyls, P.2
Ophey, W.3
-
36
-
-
77954736560
-
-
Verayo, http://www.verayo.com
-
-
-
-
37
-
-
77954715859
-
-
IntrinsicID, http://www.intrinsic-id.com
-
-
-
|