-
1
-
-
0037144430
-
Physical one-way functions
-
R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld. Physical one-way functions. Science, 297(5589):2026, 2002.
-
(2002)
Science
, vol.297
, Issue.5589
, pp. 2026
-
-
Pappu, R.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
2
-
-
0038341105
-
Silicon physical random functions
-
ACM
-
B. Gassend, D. Clarke, M. Van Dijk, and S. Devadas. Silicon physical random functions. In Proceedings of the 9th ACM Conference on Computer and Communications Security, page 160. ACM, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
3
-
-
46449138830
-
Controlled physical random functions
-
Silver Spring, MD, December
-
Blaise Gassend, Dwaine Clarke, Marten van Dijk, and Srinivas Devadas. Controlled physical random functions. In Proceedings of 18th Annual Computer Security Applications Conference, Silver Spring, MD, December 2002.
-
(2002)
Proceedings of 18th Annual Computer Security Applications Conference
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
4
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
J. Guajardo, S. Kumar, G.J. Schrijen, and P. Tuyls. FPGA intrinsic PUFs and their use for IP protection. Cryptographic Hardware and Embedded Systems-CHES 2007, pages 63-80, 2007.
-
(2007)
Cryptographic Hardware and Embedded Systems-CHES 2007
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.J.3
Tuyls, P.4
-
7
-
-
76649124351
-
Strong authentication with PUFs
-
M. Petkovic, W. Jonker (Eds.), Springer
-
P. Tuyls and B. Skoric. Strong Authentication with PUFs. In: Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (Eds.), Springer, 2007.
-
(2007)
Security, Privacy and Trust in Modern Data Management
-
-
Tuyls, P.1
Skoric, B.2
-
8
-
-
77954743811
-
Oblivious transfer based on physical unclonable functions (extended abstract). in Alessandro Acquisti, Sean W. Smith, and Ahmad-Reza Sadeghi
-
editors, TRUST, Springer
-
Ulrich Rührmair. Oblivious transfer based on physical unclonable functions (extended abstract). In Alessandro Acquisti, Sean W. Smith, and Ahmad-Reza Sadeghi, editors, TRUST, volume 6101 of Lecture Notes in Computer Science, pages 430-440. Springer, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6101
, pp. 430-440
-
-
Rührmair, U.1
-
11
-
-
4344587804
-
Identification and authentication of integrated circuits
-
B. Gassend, D. Lim, D. Clarke, M. Van Dijk, and S. Devadas. Identification and authentication of integrated circuits. Concurrency and Computation: Practice & Experience, 16(11):1077-1098, 2004.
-
(2004)
Concurrency and Computation: Practice & Experience
, vol.16
, Issue.11
, pp. 1077-1098
-
-
Gassend, B.1
Lim, D.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
-
12
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. Van Dijk, and S. Devadas. A technique to build a secret key in integrated circuits for identification and authentication applications. In Proceedings of the IEEE VLSI Circuits Symposium, pages 176-179, 2004.
-
(2004)
Proceedings of the IEEE VLSI Circuits Symposium
, pp. 176-179
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
13
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
D. Lim, J.W. Lee, B. Gassend, G.E. Suh, M. Van Dijk, and S. Devadas. Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration Systems, 13(10):1200, 2005.
-
(2005)
IEEE Transactions on Very Large Scale Integration Systems
, vol.13
, Issue.10
, pp. 1200
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
15
-
-
51849144293
-
Extended abstract: The butterfly PUF protecting IP on every FPGA
-
S.S. Kumar, J. Guajardo, R. Maes, G.J. Schrijen, and P. Tuyls. Extended abstract: The butterfly PUF protecting IP on every FPGA. In IEEE International Workshop on Hardware-Oriented Security and Trust 2008. HOST 2008, pages 67-70, 2008.
-
(2008)
IEEE International Workshop on Hardware-Oriented Security and Trust 2008. HOST 2008
, pp. 67-70
-
-
Kumar, S.S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.J.4
Tuyls, P.5
-
16
-
-
33750726983
-
Read-proof hardware from protective coatings
-
P. Tuyls, G.J. Schrijen, B. Škorić, J. van Geloven, N. Verhaegh, and R. Wolters. Read-proof hardware from protective coatings. Cryptographic Hardware and Embedded Systems-CHES 2006, pages 369-383, 2006.
-
(2006)
Cryptographic Hardware and Embedded Systems-CHES 2006
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.J.2
Škorić, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
18
-
-
49149115221
-
Towards robust low cost authentication for pervasive devices
-
IEEE Computer Society
-
Erdinç Ötürk, Ghaith Hammouri, and Berk Sunar. Towards robust low cost authentication for pervasive devices. In PerCom, pages 170-178. IEEE Computer Society, 2008.
-
(2008)
PerCom
, pp. 170-178
-
-
Ötürk, E.1
Hammouri, G.2
Sunar, B.3
-
22
-
-
84943274699
-
A direct adaptive method for faster backpropagation learning: The RPROP algorithm
-
San Francisco: IEEE
-
M. Riedmiller and H. Braun. A direct adaptive method for faster backpropagation learning: The RPROP algorithm. In Proceedings of the IEEE international conference on neural networks, volume 1993, pages 586-591. San Francisco: IEEE, 1993.
-
(1993)
Proceedings of the IEEE International Conference on Neural Networks
, vol.1993
, pp. 586-591
-
-
Riedmiller, M.1
Braun, H.2
-
23
-
-
78650030623
-
-
http://www.pcp.in.tum.de/code/lr.zip, 2010.
-
(2010)
-
-
-
26
-
-
78650024340
-
-
T. Schaul, J. Bayer, D. Wierstra, Y. Sun, M. Felder, F. Sehnke, T. Rückstieß, and J. Schmidhuber. PyBrain. Journal of Machine Learning Research, 1:999-1000, 2010.
-
(2010)
PyBrain. Journal of Machine Learning Research
, vol.1
, pp. 999-1000
-
-
Schaul, T.1
Bayer, J.2
Wierstra, D.3
Sun, Y.4
Felder, M.5
Sehnke, F.6
Rückstieß, T.7
Schmidhuber, J.8
-
29
-
-
77952339214
-
Application of mismatched cellular nonlinear networks for physical cryptography
-
Berkeley, CA, USA, February
-
G. Csaba, X. Ju, Z. Ma, Q. Chen, W. Porod, J. Schmidhuber, U. Schlichtmann, P. Lugli, and U. Rührmair. Application of mismatched cellular nonlinear networks for physical cryptography. In 12th IEEE CNNA - International Workshop on Cellula Nanoscale Networks and their Applications. Berkeley, CA, USA, February 3-5 2010.
-
(2010)
12th IEEE CNNA - International Workshop on Cellula Nanoscale Networks and Their Applications
, pp. 3-5
-
-
Csaba, G.1
Ju, X.2
Ma, Z.3
Chen, Q.4
Porod, W.5
Schmidhuber, J.6
Schlichtmann, U.7
Lugli, P.8
Rührmair, U.9
-
30
-
-
77954692234
-
Applications of high-capacity crossbar memories in cryptography
-
To appear
-
U. Rührmair, C. Jaeger, M. Bator, M. Stutzmann, P. Lugli, and G. Csaba. Applications of high-capacity crossbar memories in cryptography. To appear in IEEE Transactions on Nanotechnology, 2010.
-
(2010)
IEEE Transactions on Nanotechnology
-
-
Rührmair, U.1
Jaeger, C.2
Bator, M.3
Stutzmann, M.4
Lugli, P.5
Csaba, G.6
-
31
-
-
77955319391
-
Security applications of diodes with unique current-voltage characteristics
-
Tenerife (Spain), January 25 - 28. 14th International Conference on Financial Cryptography and Data Security, Springer
-
U. Rührmair, C. Jaeger, C. Hilgers, M. Algasinger, G. Csaba, and M. Stutzmann. Security applications of diodes with unique current-voltage characteristics. In Lecture Notes in Computer Science, volume 6052, Tenerife (Spain), January 25 - 28 2010. 14th International Conference on Financial Cryptography and Data Security, Springer.
-
(2010)
Lecture Notes in Computer Science
, vol.6052
-
-
Rührmair, U.1
Jaeger, C.2
Hilgers, C.3
Algasinger, M.4
Csaba, G.5
Stutzmann, M.6
-
32
-
-
77952336010
-
Random p-n-junctions for physical cryptography
-
172103
-
C. Jaeger, M. Algasinger, U. Rührmair, G. Csaba, and M. Stutzmann. Random p-n-junctions for physical cryptography. Applied Physics Letters, 96(172103), 2010. 249
-
(2010)
Applied Physics Letters
, vol.96
, pp. 249
-
-
Jaeger, C.1
Algasinger, M.2
Rührmair, U.3
Csaba, G.4
Stutzmann, M.5
|