메뉴 건너뛰기




Volumn 6387 LNCS, Issue , 2010, Pages 1-16

FPGA time-bounded unclonable authentication

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION PROTOCOLS; BIT STREAM; CONFIGURABLE LOGIC BLOCKS; DIGITAL FORMS; NOVEL TECHNIQUES; OPERATIONAL CONDITIONS; PHYSICAL UNCLONABLE FUNCTIONS; PROOF OF CONCEPT; SIGNATURE EXTRACTION; VARIOUS ATTACKS;

EID: 78549254941     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-16435-4_1     Document Type: Conference Paper
Times cited : (17)

References (19)
  • 4
    • 70349252061 scopus 로고    scopus 로고
    • Binding software to specific native hardware in a VM environment: The PUF challenge and opportunity
    • Atallah, M., Bryant, E., Korb, J., Rice, J.: Binding software to specific native hardware in a VM environment: the PUF challenge and opportunity. In: VMSec, pp. 45-48 (2008)
    • (2008) VMSec , pp. 45-48
    • Atallah, M.1    Bryant, E.2    Korb, J.3    Rice, J.4
  • 5
    • 38049015807 scopus 로고    scopus 로고
    • FPGA intrinsic PUFs and their use for IP protection
    • Paillier, P., Verbauwhede, I. (eds.) LNCS Springer, Heidelberg
    • Guajardo, J., Kumar, S., Schrijen, G., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
    • (2007) CHES 2007 , vol.4727 , pp. 63-80
    • Guajardo, J.1    Kumar, S.2    Schrijen, G.3    Tuyls, P.4
  • 6
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • Suh, G., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: DAC, pp. 9-14 (2007)
    • (2007) DAC , pp. 9-14
    • Suh, G.1    Devadas, S.2
  • 7
    • 76949093125 scopus 로고    scopus 로고
    • Techniques for design and implementation of secure reconfigurable pufs
    • Majzoobi, M., Koushanfar, F., Potkonjak, M.: Techniques for design and implementation of secure reconfigurable pufs. ACM TRETS 2(1), 1-33 (2009)
    • (2009) ACM TRETS , vol.2 , Issue.1 , pp. 1-33
    • Majzoobi, M.1    Koushanfar, F.2    Potkonjak, M.3
  • 9
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication applications
    • Lee, J., Daihyun, L., Gassend, B., Suh, G., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symp. of VLSI, pp. 176-179 (2004)
    • (2004) Symp. of VLSI , pp. 176-179
    • Lee, J.1    Daihyun, L.2    Gassend, B.3    Suh, G.4    Van Dijk, M.5    Devadas, S.6
  • 10
    • 68949175522 scopus 로고    scopus 로고
    • Power-up SRAM state as an identifying fingerprint and source of true random numbers
    • Holcomb, D., Burleson, W., Fu, K.: Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Computers (2009)
    • (2009) IEEE Trans. Computers
    • Holcomb, D.1    Burleson, W.2    Fu, K.3
  • 13
    • 77950450649 scopus 로고    scopus 로고
    • SIMPL system: On a public key variant of physical unclonable function
    • Ruhrmair, U.: SIMPL system: on a public key variant of physical unclonable function. In: Cryptology ePrint Archive (2009)
    • (2009) Cryptology EPrint Archive
    • Ruhrmair, U.1
  • 16
    • 78549237663 scopus 로고    scopus 로고
    • Self-measurement of combinatorial circuit delays in fpgas
    • Wong, J.S.J., Sedcole, P., Cheung, P.Y.K.: Self-measurement of combinatorial circuit delays in fpgas. ACM TRETS 2(2), 1-22 (2009)
    • (2009) ACM TRETS , vol.2 , Issue.2 , pp. 1-22
    • Wong, J.S.J.1    Sedcole, P.2    Cheung, P.Y.K.3
  • 17
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Cachin, C., Camenisch, J.L. (eds.) LNCS Springer, Heidelberg
    • Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004 , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 18
    • 70350469042 scopus 로고    scopus 로고
    • Hardware-based public-key cryptography with public physically unclonable functions
    • Katzenbeisser, S., Sadeghi, A.-R. (eds.) LNCS Springer, Heidelberg
    • Beckmann, N., Potkonjak, M.: Hardware-based public-key cryptography with public physically unclonable functions. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 206-220. Springer, Heidelberg (2009)
    • (2009) IH 2009 , vol.5806 , pp. 206-220
    • Beckmann, N.1    Potkonjak, M.2
  • 19
    • 70349276392 scopus 로고    scopus 로고
    • From the bitstream to the netlist
    • Note, J., Rannaud, E.: From the bitstream to the netlist. In: FPGA, pp. 264-274 (2008)
    • (2008) FPGA , pp. 264-274
    • Note, J.1    Rannaud, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.