메뉴 건너뛰기




Volumn , Issue , 2010, Pages 43-48

Low-power sub-threshold design of secure physical unclonable functions

Author keywords

Embedded system security; Physical unclonable function; RFID; Sub threshold circuits

Indexed keywords

CMOS TECHNOLOGY; DESIGN OPTIMIZATION; HIGH SENSITIVITY; LAYOUT DESIGNS; LOW POWER; LOW SUPPLY VOLTAGES; LOW-POWER CONSUMPTION; MODELING PROCESS; PHYSICAL UNCLONABLE FUNCTIONS; POWER-DELAY PRODUCTS; PROCESS VARIATION; RFID; SECURITY APPLICATION; SIDE-CHANNEL ANALYSIS; SUB-THRESHOLD DESIGN; SUBTHRESHOLD; SUPPLY VOLTAGES; WIRELESS SENSING;

EID: 77957943386     PISSN: 15334678     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1840845.1840855     Document Type: Conference Paper
Times cited : (72)

References (27)
  • 3
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • G. E. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. In ACM/IEEE Design Automation Conference, pages 9-14, 2007.
    • (2007) ACM/IEEE Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 5
    • 68949175522 scopus 로고    scopus 로고
    • Power-up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
    • D. E. Holcomb, W. P. Burleson, and K. Fu. Power-up SRAM State as an Identifying Fingerprint and Source of True Random Numbers. IEEE Transactions on Computers, 58(9):1198-1210, 2009.
    • (2009) IEEE Transactions on Computers , vol.58 , Issue.9 , pp. 1198-1210
    • Holcomb, D.E.1    Burleson, W.P.2    Fu, K.3
  • 8
    • 34548285839 scopus 로고    scopus 로고
    • Remote password extraction from RFID tags
    • Y. Oren and A. Shamir. Remote password extraction from RFID tags. IEEE Transactions on Computers, 56(9):1292-1296, 2007.
    • (2007) IEEE Transactions on Computers , vol.56 , Issue.9 , pp. 1292-1296
    • Oren, Y.1    Shamir, A.2
  • 9
    • 84893081352 scopus 로고    scopus 로고
    • Reverse-engineering a cryptographic RFID tag
    • K. Nohl and D. Evans. Reverse-engineering a cryptographic RFID tag. In USENIX Security Symposium, pages 185-193, 2008.
    • (2008) USENIX Security Symposium , pp. 185-193
    • Nohl, K.1    Evans, D.2
  • 10
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • A. Juels and S. A. Weis. Authenticating pervasive devices with human protocols. Lecture notes in computer science, 3621:293, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 293
    • Juels, A.1    Weis, S.A.2
  • 13
    • 70350724703 scopus 로고    scopus 로고
    • Analysis and mitigation of process variation impacts on power-attack tolerance
    • L. Lin and W. P. Burleson. Analysis and mitigation of process variation impacts on power-attack tolerance. In ACM/IEEE DAC, pages 238-243, 2009.
    • (2009) ACM/IEEE DAC , pp. 238-243
    • Lin, L.1    Burleson, W.P.2
  • 14
    • 77957933909 scopus 로고    scopus 로고
    • Verayo PUF RFID
    • Verayo PUF RFID. http://www.verayo.com/product/pufr-d.html, 2008.
    • (2008)
  • 15
    • 70350614531 scopus 로고    scopus 로고
    • Low-overhead implementation of a soft decision helper data algorithm for sram pufs
    • Springer-Verlag
    • R. Maes, P. Tuyls, and I. Verbauwhede. Low-overhead implementation of a soft decision helper data algorithm for sram pufs. In CHES, pages 332-347. Springer-Verlag, 2009.
    • (2009) CHES , pp. 332-347
    • Maes, R.1    Tuyls, P.2    Verbauwhede, I.3
  • 16
    • 25144514874 scopus 로고    scopus 로고
    • Modeling and sizing for minimum energy operation in sub-threshold circuits
    • B. H. Calhoun, A. Wang, and A. P. Chandrakasan. Modeling and sizing for minimum energy operation in sub-threshold circuits. IEEE Journal of Solid-State Circuits, volume 40, pages 1778-1786, 2005.
    • (2005) IEEE Journal of Solid-State Circuits , vol.40 , pp. 1778-1786
    • Calhoun, B.H.1    Wang, A.2    Chandrakasan, A.P.3
  • 18
    • 70449120146 scopus 로고    scopus 로고
    • Circuit-level techniques for reliable physically uncloneable functions
    • V. Vivekraja and L. Nazhandali. Circuit-Level Techniques for Reliable Physically Uncloneable Functions. In IEEE HOST, pages 30-35, 2009.
    • (2009) IEEE HOST , pp. 30-35
    • Vivekraja, V.1    Nazhandali., L.2
  • 19
    • 34249032848 scopus 로고    scopus 로고
    • International Technology Roadmap for Semiconductors. 2006 ITRS report, http://www.itrs.net/Links/2006Update/2006UpdateFinal.htm
    • (2006) ITRS Report
  • 20
    • 70449704647 scopus 로고    scopus 로고
    • Nanometer mosfet effects on the minimum-energy point of 45nm subthreshold logic.
    • D. Bol, D. Kamel, D. Flandre, and J. D. Legat. Nanometer mosfet effects on the minimum-energy point of 45nm subthreshold logic. In ISLPED, pages 3-8, 2009.
    • (2009) ISLPED , pp. 3-8
    • Bol, D.1    Kamel, D.2    Flandre, D.3    Legat, J.D.4
  • 21
    • 49049105769 scopus 로고    scopus 로고
    • Design and implementation of puf-based unclonable RFID ICs for anti-counterfeiting and security applications
    • S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal. Design and implementation of puf-based "unclonable" RFID ICs for anti-counterfeiting and security applications. In IEEE International Conference on RFID, pages 58-64, 2008.
    • (2008) IEEE International Conference on RFID , pp. 58-64
    • Devadas, S.1    Suh, E.2    Paral, S.3    Sowell, R.4    Ziola, T.5    Khandelwal, V.6
  • 22
    • 20044382924 scopus 로고    scopus 로고
    • M.S. thesis Cambridge: Dept. Elect. Eng. Comput. Sci., Massachusetts Inst. Technol., May
    • D. Lim. Extracting secret keys from integrated circuits. M.S. thesis Cambridge: Dept. Elect. Eng. Comput. Sci., Massachusetts Inst. Technol., May 2004.
    • (2004) Extracting Secret Keys from Integrated Circuits
    • Lim, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.