-
2
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
DOI 10.1109/TVLSI.2005.859470
-
D. Lim, J.W. Lee, B. Gassend, G.E. Suh, M. van Dijk, and S. Devadas, "Extracting secret keys from integrated circuits," IEEE Trans. VLSI Syst., vol.13, no.10, pp.1200-1205, 2005. (Pubitemid 43131686)
-
(2005)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
3
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
-
G.E. Suh, and S. Devadas, "Physical physical unclonable functions for device authentication and secret key generation," DAC'07, pp.9-14, 2007. (Pubitemid 47129916)
-
(2007)
Proceedings - Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
4
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
J. Guajardo, S.S. Kumar, G.J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," CHES'07, pp.63-80, 2007.
-
(2007)
CHES'07
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
5
-
-
51849144293
-
The butterfly PUF
-
S.S. Kumar, J. Guajardo, R. Maesyz, G.J. Schrijen, and P. Tuyls, "The butterfly PUF," HOST'08, pp.67-70, 2008.
-
(2008)
HOST'08
, pp. 67-70
-
-
Kumar, S.S.1
Guajardo, J.2
Maesyz, R.3
Schrijen, G.J.4
Tuyls, P.5
-
6
-
-
51749083449
-
Physical unclonable function with tristate buffers
-
E. Ozturk, G. Hammouri, and B. Sunar, "Physical unclonable function with tristate buffers," ISCAS'08, pp.3194-3197, 2008.
-
(2008)
ISCAS'08
, pp. 3194-3197
-
-
Ozturk, E.1
Hammouri, G.2
Sunar, B.3
-
7
-
-
31344435929
-
Cryptographic processors - A survey
-
DOI 10.1109/JPROC.2005.862423
-
R. Anderson, M. Bond, J. Clulow, and S. Skorobogatov, "Cryptographic processors - a survey," Proceedings of the IEEE, vol.94, no.2, pp.357-369, 2006. (Pubitemid 43145990)
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 357-369
-
-
Anderson, R.1
Bond, M.2
Clulow, J.3
Skorobogatov, S.4
-
8
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Advances in Cryptology - CRYPTO '96
-
P.C. Kocher, "Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems," Adances in Cryptography - CRYPTO'96, pp.104-113, 1996. (Pubitemid 126106234)
-
(1996)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
9
-
-
84939573910
-
Differential power analysis
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," CRYPTO'99, pp.388-397, 1999.
-
(1999)
CRYPTO'99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
10
-
-
51049117293
-
Efficient helper data key extractor on FPGAs
-
C. Bosch, J. Guajardo, A.R. Sadegh, J. Shokrollahi, and P. Tuyls, "Efficient helper data key extractor on FPGAs," CHES'08, pp.181-197, 2008.
-
(2008)
CHES'08
, pp. 181-197
-
-
Bosch, C.1
Guajardo, J.2
Sadegh, A.R.3
Shokrollahi, J.4
Tuyls, P.5
-
11
-
-
26444487655
-
Information-theoretic security analysis of physical uncloneable functions
-
Finacial Cryptography and Data Security: 9th International Conference, FC 2005. Revised Papers
-
P. Tuyls, B. Škorić, S. Stallinga, A. Akkermans, and W. Ophey, "Information-theoretic security analysis of physical uncloneable functions," FC'05, pp.141-155, 2005. (Pubitemid 41425472)
-
(2005)
Lecture Notes in Computer Science
, vol.3570
, pp. 141-155
-
-
Tuyls, P.1
Skoric, B.2
Stallinga, S.3
Akkermans, A.H.M.4
Ophey, W.5
-
12
-
-
33746785063
-
Information-theoretic analysis of capacitive physical unclonable functions
-
024902
-
B. Škorić, S. Maubach, T. Kevenaar, and P. Tuyls, "Information-theoretic analysis of capacitive physical unclonable functions," J. Appl. Phys., vol.200, no.024902, 2006.
-
(2006)
J. Appl. Phys.
, vol.200
-
-
Škorić, B.1
Maubach, S.2
Kevenaar, T.3
Tuyls, P.4
-
13
-
-
77955766025
-
A large scale characterization of RO-PUF
-
A. Maiti, J. Casarona, L. McHale, and P. Schaumont, "A large scale characterization of RO-PUF," HOST'10, pp.66-71, 2010.
-
(2010)
HOST'10
, pp. 66-71
-
-
Maiti, A.1
Casarona, J.2
McHale, L.3
Schaumont, P.4
-
15
-
-
84870532103
-
-
National Institute of Advanced Industrial Science and Technology
-
"Side-channel attack standard evaluation board (sasebo)," http://www.rcis.aist.go.jp/special/SASEBO/Research Center for Information Security, National Institute of Advanced Industrial Science and Technology.
-
Side-channel Attack Standard Evaluation Board (sasebo)
-
-
|