메뉴 건너뛰기




Volumn 6101 LNCS, Issue , 2010, Pages 430-440

Oblivious transfer based on physical unclonable functions

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC PRIMITIVES; CRYPTOGRAPHIC PROTOCOLS; KEY EXCHANGE PROTOCOLS; OBLIVIOUS TRANSFER; PHYSICAL UNCLONABLE FUNCTIONS; SECURE TWO-PARTY COMPUTATIONS;

EID: 77954743811     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13869-0_31     Document Type: Conference Paper
Times cited : (57)

References (32)
  • 2
    • 76649124351 scopus 로고    scopus 로고
    • Strong Authentication with Physical Unclonable Functions
    • Petkovic, M., Jonker, W. (eds.) Springer, Heidelberg
    • Tuyls, P., Skoric, B.: Strong Authentication with Physical Unclonable Functions. In: Petkovic, M., Jonker, W. (eds.) Security, Privacy and Trust in Modern Data Management, Springer, Heidelberg (2007)
    • (2007) Security, Privacy and Trust in Modern Data Management
    • Tuyls, P.1    Skoric, B.2
  • 4
    • 33845223165 scopus 로고
    • A randomized protocol for signing contracts
    • Rivest, R.L., Sherman, A., Chaum, S. (eds.) Plenum Press, New York
    • Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: Rivest, R.L., Sherman, A., Chaum, S. (eds.) Proc. CRYPTO 1982, pp. 205-210. Plenum Press, New York (1982)
    • (1982) Proc. CRYPTO 1982 , pp. 205-210
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 5
    • 85030121757 scopus 로고
    • Equivalence between two flavors of oblivious transfer
    • Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
    • Crépeau, C.: Equivalence between two flavors of oblivious transfer. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 350-354. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 350-354
    • Crépeau, C.1
  • 8
    • 85032194875 scopus 로고
    • How to solve any protocol problem - An efficiency improvement
    • Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
    • Goldreich, O., Vainish, R.: How to solve any protocol problem - an efficiency improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 73-86. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 73-86
    • Goldreich, O.1    Vainish, R.2
  • 10
    • 84957649042 scopus 로고
    • Committed oblivious transfer and private multiparty computations
    • Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
    • Crepeau, C., van de Graaf, J., Tapp, A.: Committed oblivious transfer and private multiparty computations. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 110-123. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 110-123
    • Crepeau, C.1    Van De Graaf, J.2    Tapp, A.3
  • 11
    • 33144482525 scopus 로고    scopus 로고
    • Oblivious transfer using quantum entanglement
    • He, G.P., Wang, Z.D.: Oblivious transfer using quantum entanglement. Physical Review A 73(1), Part A, 012331 (2006)
    • (2006) Physical Review A , vol.73 , Issue.1 PART A , pp. 012331
    • He, G.P.1    Wang, Z.D.2
  • 13
    • 0141544069 scopus 로고    scopus 로고
    • Perfect zero-knowledge arguments for NP using any one-way permutation
    • Naor, M., Ostrovsky, R., Venkatesan, R., Yung, M.: Perfect zero-knowledge arguments for NP using any one-way function. Journal of Cryptology 11(2), 87-108 (1998) (Pubitemid 128728046)
    • (1998) Journal of Cryptology , vol.11 , Issue.2 , pp. 87-108
    • Naor, M.1
  • 16
    • 84957356475 scopus 로고    scopus 로고
    • Efficient cryptographic protocols based on noisy channels
    • Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
    • Crepeau, C.: Efficient cryptographic protocols based on noisy channels. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 306-317. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 306-317
    • Crepeau, C.1
  • 17
    • 70350627590 scopus 로고    scopus 로고
    • Oblivious Transfer from Weak Noisy Channels
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Wullschleger, J.: Oblivious Transfer from Weak Noisy Channels. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 332-349. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 332-349
    • Wullschleger, J.1
  • 18
    • 38049015807 scopus 로고    scopus 로고
    • FPGA Intrinsic PUFs and Their Use for IP Protection
    • Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
    • Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4727 , pp. 63-80
    • Guajardo, J.1    Kumar, S.S.2    Schrijen, G.J.3    Tuyls, P.4
  • 30
    • 34547307341 scopus 로고    scopus 로고
    • Physical Unclonable Functions for Device Authentication and Secret Key Generation
    • Suh, G.E., Devadas, S.: Physical Unclonable Functions for Device Authentication and Secret Key Generation. In: DAC 2007, pp. 9-14 (2007)
    • (2007) DAC 2007 , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 31
    • 33746074792 scopus 로고    scopus 로고
    • Oblivious Transfer Is Symmetric
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Wolf, S., Wullschleger, J.: Oblivious Transfer Is Symmetric. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 222-232. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 222-232
    • Wolf, S.1    Wullschleger, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.