메뉴 건너뛰기




Volumn , Issue , 2010, Pages 298-303

Quantitative and statistical performance evaluation of arbiter Physical Unclonable Functions on FPGAs

Author keywords

Arbiter PUF; FPGA; Performance evaluation; Physical Unclonable Function (PUF); Virtex 5

Indexed keywords

ARBITER PUF; FPGA; PERFORMANCE EVALUATION; PHYSICAL UNCLONABLE FUNCTION (PUF); VIRTEX-5;

EID: 79951741378     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ReConFig.2010.24     Document Type: Conference Paper
Times cited : (219)

References (17)
  • 3
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
    • G.E. Suh, and S. Devadas, "Physical physical unclonable functions for device authentication and secret key generation," DAC'07, pp.9-14, 2007. (Pubitemid 47129916)
    • (2007) Proceedings - Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 4
    • 38049015807 scopus 로고    scopus 로고
    • FPGA intrinsic PUFs and their use for IP protection
    • J. Guajardo, S.S. Kumar, G.J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," CHES'07, pp.63-80, 2007.
    • (2007) CHES'07 , pp. 63-80
    • Guajardo, J.1    Kumar, S.S.2    Schrijen, G.J.3    Tuyls, P.4
  • 6
    • 51749083449 scopus 로고    scopus 로고
    • Physical unclonable function with tristate buffers
    • E. Ozturk, G. Hammouri, and B. Sunar, "Physical unclonable function with tristate buffers," ISCAS'08, pp.3194-3197, 2008.
    • (2008) ISCAS'08 , pp. 3194-3197
    • Ozturk, E.1    Hammouri, G.2    Sunar, B.3
  • 7
    • 31344435929 scopus 로고    scopus 로고
    • Cryptographic processors - A survey
    • DOI 10.1109/JPROC.2005.862423
    • R. Anderson, M. Bond, J. Clulow, and S. Skorobogatov, "Cryptographic processors - a survey," Proceedings of the IEEE, vol.94, no.2, pp.357-369, 2006. (Pubitemid 43145990)
    • (2006) Proceedings of the IEEE , vol.94 , Issue.2 , pp. 357-369
    • Anderson, R.1    Bond, M.2    Clulow, J.3    Skorobogatov, S.4
  • 8
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Advances in Cryptology - CRYPTO '96
    • P.C. Kocher, "Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems," Adances in Cryptography - CRYPTO'96, pp.104-113, 1996. (Pubitemid 126106234)
    • (1996) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1109 , pp. 104-113
    • Kocher, P.C.1
  • 9
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," CRYPTO'99, pp.388-397, 1999.
    • (1999) CRYPTO'99 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 11
    • 26444487655 scopus 로고    scopus 로고
    • Information-theoretic security analysis of physical uncloneable functions
    • Finacial Cryptography and Data Security: 9th International Conference, FC 2005. Revised Papers
    • P. Tuyls, B. Škorić, S. Stallinga, A. Akkermans, and W. Ophey, "Information-theoretic security analysis of physical uncloneable functions," FC'05, pp.141-155, 2005. (Pubitemid 41425472)
    • (2005) Lecture Notes in Computer Science , vol.3570 , pp. 141-155
    • Tuyls, P.1    Skoric, B.2    Stallinga, S.3    Akkermans, A.H.M.4    Ophey, W.5
  • 12
    • 33746785063 scopus 로고    scopus 로고
    • Information-theoretic analysis of capacitive physical unclonable functions
    • 024902
    • B. Škorić, S. Maubach, T. Kevenaar, and P. Tuyls, "Information-theoretic analysis of capacitive physical unclonable functions," J. Appl. Phys., vol.200, no.024902, 2006.
    • (2006) J. Appl. Phys. , vol.200
    • Škorić, B.1    Maubach, S.2    Kevenaar, T.3    Tuyls, P.4
  • 15
    • 84870532103 scopus 로고    scopus 로고
    • National Institute of Advanced Industrial Science and Technology
    • "Side-channel attack standard evaluation board (sasebo)," http://www.rcis.aist.go.jp/special/SASEBO/Research Center for Information Security, National Institute of Advanced Industrial Science and Technology.
    • Side-channel Attack Standard Evaluation Board (sasebo)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.