-
1
-
-
0037144430
-
Physical One-Way Functions
-
Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-Way Functions. Science 297, 2026-2030 (2002)
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
2
-
-
76649124351
-
Strong Authentication with Physical Unclonable Functions
-
Petkovic, M., Jonker, W. (eds.) Springer, Heidelberg
-
Tuyls, P., Skoric, B.: Strong Authentication with Physical Unclonable Functions. In: Petkovic, M., Jonker, W. (eds.) Security, Privacy and Trust in Modern Data Management, Springer, Heidelberg (2007)
-
(2007)
Security, Privacy and Trust in Modern Data Management
-
-
Tuyls, P.1
Skoric, B.2
-
4
-
-
33845223165
-
A randomized protocol for signing contracts
-
Rivest, R.L., Sherman, A., Chaum, S. (eds.) Plenum Press, New York
-
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: Rivest, R.L., Sherman, A., Chaum, S. (eds.) Proc. CRYPTO 1982, pp. 205-210. Plenum Press, New York (1982)
-
(1982)
Proc. CRYPTO 1982
, pp. 205-210
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
5
-
-
85030121757
-
Equivalence between two flavors of oblivious transfer
-
Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
-
Crépeau, C.: Equivalence between two flavors of oblivious transfer. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 350-354. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 350-354
-
-
Crépeau, C.1
-
7
-
-
0023545076
-
How to play any mental game, or a completeness theorem for protocols with honest majority
-
Goldreich, O., Micali, S., Widgerson, A.: How to play any mental game, or a completeness theorem for protocols with honest majority. In: Proc. of the 19th Annual Symposium on the Theory of Computing (STOC), pp. 218-229 (1987)
-
(1987)
Proc. of the 19th Annual Symposium on the Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Widgerson, A.3
-
8
-
-
85032194875
-
How to solve any protocol problem - An efficiency improvement
-
Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
-
Goldreich, O., Vainish, R.: How to solve any protocol problem - an efficiency improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 73-86. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
10
-
-
84957649042
-
Committed oblivious transfer and private multiparty computations
-
Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
-
Crepeau, C., van de Graaf, J., Tapp, A.: Committed oblivious transfer and private multiparty computations. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 110-123. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 110-123
-
-
Crepeau, C.1
Van De Graaf, J.2
Tapp, A.3
-
11
-
-
33144482525
-
Oblivious transfer using quantum entanglement
-
He, G.P., Wang, Z.D.: Oblivious transfer using quantum entanglement. Physical Review A 73(1), Part A, 012331 (2006)
-
(2006)
Physical Review A
, vol.73
, Issue.1 PART A
, pp. 012331
-
-
He, G.P.1
Wang, Z.D.2
-
12
-
-
44949188319
-
Cryptography from noisy storage
-
Wehner, S., Schaffner, C., Terhal, B.M.: Cryptography from noisy storage. Phys. Rev. Lett. 100(22), 220-502 (2008)
-
(2008)
Phys. Rev. Lett.
, vol.100
, Issue.22
, pp. 220-502
-
-
Wehner, S.1
Schaffner, C.2
Terhal, B.M.3
-
13
-
-
0141544069
-
Perfect zero-knowledge arguments for NP using any one-way permutation
-
Naor, M., Ostrovsky, R., Venkatesan, R., Yung, M.: Perfect zero-knowledge arguments for NP using any one-way function. Journal of Cryptology 11(2), 87-108 (1998) (Pubitemid 128728046)
-
(1998)
Journal of Cryptology
, vol.11
, Issue.2
, pp. 87-108
-
-
Naor, M.1
-
15
-
-
33947520247
-
Constant-Round Oblivious Transfer in the Bounded Storage Model
-
Ding, Y.Z., Harnik, D., Rosen, A., Shaltiel, R.: Constant-Round Oblivious Transfer in the Bounded Storage Model. Journal of Cryptology (2007)
-
(2007)
Journal of Cryptology
-
-
Ding, Y.Z.1
Harnik, D.2
Rosen, A.3
Shaltiel, R.4
-
16
-
-
84957356475
-
Efficient cryptographic protocols based on noisy channels
-
Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
-
Crepeau, C.: Efficient cryptographic protocols based on noisy channels. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 306-317. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 306-317
-
-
Crepeau, C.1
-
17
-
-
70350627590
-
Oblivious Transfer from Weak Noisy Channels
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Wullschleger, J.: Oblivious Transfer from Weak Noisy Channels. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 332-349. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 332-349
-
-
Wullschleger, J.1
-
18
-
-
38049015807
-
FPGA Intrinsic PUFs and Their Use for IP Protection
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
21
-
-
4344587804
-
Identification and authentication of integrated circuits
-
Gassend, B., Lim, D., Clarke, D., Dijk, M.v., Devadas, S.: Identification and authentication of integrated circuits. Concurrency and Computation: Practice & Experience 1611, 1077-1098 (2004)
-
(2004)
Concurrency and Computation: Practice & Experience
, vol.1611
, pp. 1077-1098
-
-
Gassend, B.1
Lim, D.2
Clarke, D.3
Dijk, M.V.4
Devadas, S.5
-
22
-
-
4544381402
-
A technique to build a secret key in integrated circuits with identification and authentication applications
-
Lee, J.-W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits with identification and authentication applications. In: Proceedings of the IEEE VLSI Circuits Symposium (June 2004)
-
Proceedings of the IEEE VLSI Circuits Symposium (June 2004)
-
-
Lee, J.-W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
24
-
-
77954740688
-
Application of Mismatched Cellular Nonlinear Networks for Physical Cryptography
-
Csaba, G., Ju, X., Ma, Z., Chen, Q., Porod, W., Schmidhuber, J., Schlichtmann, U., Lugli, P., Rührmair, U.: Application of Mismatched Cellular Nonlinear Networks for Physical Cryptography. In: IEEE CNNA (2010)
-
(2010)
IEEE CNNA
-
-
Csaba, G.1
Ju, X.2
Ma, Z.3
Chen, Q.4
Porod, W.5
Schmidhuber, J.6
Schlichtmann, U.7
Lugli, P.8
Rührmair, U.9
-
26
-
-
77954726451
-
-
submitted
-
Rührmair, U., Sehnke, F., Soelter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling Attacks on Physical Unclonable Functions (submitted 2010)
-
(2010)
Modeling Attacks on Physical Unclonable Functions
-
-
Rührmair, U.1
Sehnke, F.2
Soelter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
27
-
-
84903843997
-
Security Applications of Diodes with Random Current-Voltage Characteristics
-
Rührmair, U., Jaeger, C., Hilgers, C., Algasinger, M., Csaba, G., Stutzmann, M.: Security Applications of Diodes with Random Current-Voltage Characteristics. In: Financial Cryptography and Data Security (2010)
-
(2010)
Financial Cryptography and Data Security
-
-
Rührmair, U.1
Jaeger, C.2
Hilgers, C.3
Algasinger, M.4
Csaba, G.5
Stutzmann, M.6
-
28
-
-
77954692234
-
Applications of High-Capacity Crossbar Memories in Cryptography
-
to appear
-
Rührmair, U., Jaeger, C., Bator, M., Stutzmann, M., Lugli, P., Csaba, G.: Applications of High-Capacity Crossbar Memories in Cryptography. IEEE Transactions on Nanotechnology (to appear 2010)
-
(2010)
IEEE Transactions on Nanotechnology
-
-
Rührmair, U.1
Jaeger, C.2
Bator, M.3
Stutzmann, M.4
Lugli, P.5
Csaba, G.6
-
29
-
-
77952336010
-
Random pn-junctions for physical cryptography
-
to appear
-
Jaeger, C., Algasinger, M., Rührmair, U., Csaba, G., Stutzmann, M.: Random pn-junctions for physical cryptography. Applied Physics Letters (to appear 2010)
-
(2010)
Applied Physics Letters
-
-
Jaeger, C.1
Algasinger, M.2
Rührmair, U.3
Csaba, G.4
Stutzmann, M.5
-
30
-
-
34547307341
-
Physical Unclonable Functions for Device Authentication and Secret Key Generation
-
Suh, G.E., Devadas, S.: Physical Unclonable Functions for Device Authentication and Secret Key Generation. In: DAC 2007, pp. 9-14 (2007)
-
(2007)
DAC 2007
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
31
-
-
33746074792
-
Oblivious Transfer Is Symmetric
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Wolf, S., Wullschleger, J.: Oblivious Transfer Is Symmetric. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 222-232. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 222-232
-
-
Wolf, S.1
Wullschleger, J.2
|