-
1
-
-
0038341105
-
Silicon physical random functions
-
B. Gassend, D. Clarke, M. Van Dijk, and S. Devadas. Silicon physical random functions. In Proceedings of the 9th ACM conference on Computer and communications security, pages 148-160, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
2
-
-
0037144430
-
Physical one-way functions
-
R. S. Pappu, B. Recht, J. Taylor, and N. Gershenfeld. Physical one-way functions. Science, 297(6):2026-2030, 2002.
-
(2002)
Science
, vol.297
, Issue.6
, pp. 2026-2030
-
-
Pappu, R.S.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
3
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
G. E. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. In ACM/IEEE Design Automation Conference, pages 9-14, 2007.
-
(2007)
ACM/IEEE Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
4
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
September
-
J. Guajardo, S. S. Kumar, G. Schrijen, and P. Tuyls. FPGA intrinsic PUFs and their use for IP protection. In Proceedings of the Workshop on Cryptographic Hardware and Embedded Security, pages 63-80, September 2007.
-
(2007)
Proceedings of the Workshop on Cryptographic Hardware and Embedded Security
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.3
Tuyls, P.4
-
5
-
-
68949175522
-
Power-up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
-
D. E. Holcomb, W. P. Burleson, and K. Fu. Power-up SRAM State as an Identifying Fingerprint and Source of True Random Numbers. IEEE Transactions on Computers, 58(9):1198-1210, 2009.
-
(2009)
IEEE Transactions on Computers
, vol.58
, Issue.9
, pp. 1198-1210
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
6
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of Symposium on Security and Privacy, pages 129-142, 2008.
-
(2008)
Proceedings of Symposium on Security and Privacy
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
7
-
-
70349287159
-
Vulnerabilities in first-generation RFID-enabled credit cards
-
T. S. Heydt-Benjamin, D. V. Bailey, K. Fu, A. Juels, and T. OHare. Vulnerabilities in First-Generation RFID-enabled Credit Cards. In Financial Cryptography, 2007.
-
(2007)
Financial Cryptography
-
-
Heydt-Benjamin, T.S.1
Bailey, D.V.2
Fu, K.3
Juels, A.4
Ohare, T.5
-
8
-
-
34548285839
-
Remote password extraction from RFID tags
-
Y. Oren and A. Shamir. Remote password extraction from RFID tags. IEEE Transactions on Computers, 56(9):1292-1296, 2007.
-
(2007)
IEEE Transactions on Computers
, vol.56
, Issue.9
, pp. 1292-1296
-
-
Oren, Y.1
Shamir, A.2
-
9
-
-
84893081352
-
Reverse-engineering a cryptographic RFID tag
-
K. Nohl and D. Evans. Reverse-engineering a cryptographic RFID tag. In USENIX Security Symposium, pages 185-193, 2008.
-
(2008)
USENIX Security Symposium
, pp. 185-193
-
-
Nohl, K.1
Evans, D.2
-
10
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
A. Juels and S. A. Weis. Authenticating pervasive devices with human protocols. Lecture notes in computer science, 3621:293, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 293
-
-
Juels, A.1
Weis, S.A.2
-
11
-
-
37149018890
-
A survey of lightweight-cryptography implementations
-
T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel. A survey of lightweight-cryptography implementations. IEEE Design & Test of Computers, pages 522-533, 2007.
-
(2007)
IEEE Design & Test of Computers
, pp. 522-533
-
-
Eisenbarth, T.1
Kumar, S.2
Paar, C.3
Poschmann, A.4
Uhsadel, L.5
-
12
-
-
37149000571
-
Power analysis attacks and countermeasures
-
T. Popp, E. Oswald, and S. Mangard. Power analysis attacks and countermeasures. IEEE Design & Test of Computers, 24(6):535-543, 2007.
-
(2007)
IEEE Design & Test of Computers
, vol.24
, Issue.6
, pp. 535-543
-
-
Popp, T.1
Oswald, E.2
Mangard, S.3
-
13
-
-
70350724703
-
Analysis and mitigation of process variation impacts on power-attack tolerance
-
L. Lin and W. P. Burleson. Analysis and mitigation of process variation impacts on power-attack tolerance. In ACM/IEEE DAC, pages 238-243, 2009.
-
(2009)
ACM/IEEE DAC
, pp. 238-243
-
-
Lin, L.1
Burleson, W.P.2
-
14
-
-
77957933909
-
-
Verayo PUF RFID
-
Verayo PUF RFID. http://www.verayo.com/product/pufr-d.html, 2008.
-
(2008)
-
-
-
15
-
-
70350614531
-
Low-overhead implementation of a soft decision helper data algorithm for sram pufs
-
Springer-Verlag
-
R. Maes, P. Tuyls, and I. Verbauwhede. Low-overhead implementation of a soft decision helper data algorithm for sram pufs. In CHES, pages 332-347. Springer-Verlag, 2009.
-
(2009)
CHES
, pp. 332-347
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
16
-
-
25144514874
-
Modeling and sizing for minimum energy operation in sub-threshold circuits
-
B. H. Calhoun, A. Wang, and A. P. Chandrakasan. Modeling and sizing for minimum energy operation in sub-threshold circuits. IEEE Journal of Solid-State Circuits, volume 40, pages 1778-1786, 2005.
-
(2005)
IEEE Journal of Solid-State Circuits
, vol.40
, pp. 1778-1786
-
-
Calhoun, B.H.1
Wang, A.2
Chandrakasan, A.P.3
-
17
-
-
34247264340
-
Energy optimality and variability in subthreshold design
-
DOI 10.1145/1165573.1165660, ISLPED'06 - Proceedings of the 2006 International Symposium on Low Power Electronics and Design
-
S. Hanson, B. Zhai, D. Blaauw, D. Sylvester, A. Bryant, and X. Wang. Energy optimality and variability in subthreshold design. In ACM/IEEE ISLPED, pages 363-365, 2006. (Pubitemid 46609767)
-
(2006)
Proceedings of the International Symposium on Low Power Electronics and Design
, vol.2006
, pp. 363-365
-
-
Hanson, S.1
Zhai, B.2
Blaauw, D.3
Sylvester, D.4
Bryant, A.5
Wang, X.6
-
18
-
-
70449120146
-
Circuit-level techniques for reliable physically uncloneable functions
-
V. Vivekraja and L. Nazhandali. Circuit-Level Techniques for Reliable Physically Uncloneable Functions. In IEEE HOST, pages 30-35, 2009.
-
(2009)
IEEE HOST
, pp. 30-35
-
-
Vivekraja, V.1
Nazhandali., L.2
-
19
-
-
34249032848
-
-
International Technology Roadmap for Semiconductors. 2006 ITRS report, http://www.itrs.net/Links/2006Update/2006UpdateFinal.htm
-
(2006)
ITRS Report
-
-
-
20
-
-
70449704647
-
Nanometer mosfet effects on the minimum-energy point of 45nm subthreshold logic.
-
D. Bol, D. Kamel, D. Flandre, and J. D. Legat. Nanometer mosfet effects on the minimum-energy point of 45nm subthreshold logic. In ISLPED, pages 3-8, 2009.
-
(2009)
ISLPED
, pp. 3-8
-
-
Bol, D.1
Kamel, D.2
Flandre, D.3
Legat, J.D.4
-
21
-
-
49049105769
-
Design and implementation of puf-based unclonable RFID ICs for anti-counterfeiting and security applications
-
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal. Design and implementation of puf-based "unclonable" RFID ICs for anti-counterfeiting and security applications. In IEEE International Conference on RFID, pages 58-64, 2008.
-
(2008)
IEEE International Conference on RFID
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
22
-
-
20044382924
-
-
M.S. thesis Cambridge: Dept. Elect. Eng. Comput. Sci., Massachusetts Inst. Technol., May
-
D. Lim. Extracting secret keys from integrated circuits. M.S. thesis Cambridge: Dept. Elect. Eng. Comput. Sci., Massachusetts Inst. Technol., May 2004.
-
(2004)
Extracting Secret Keys from Integrated Circuits
-
-
Lim, D.1
-
27
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. Van Dijk, and S. Devadas. Extracting secret keys from integrated circuits. IEEE Transactions on VLSI, 13(10):1200-1205, 2005.
-
(2005)
IEEE Transactions on VLSI
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
|