-
1
-
-
0037952426
-
-
Ph.D. dissertation, Massachusetts Institute of Technology
-
P. Ravikanth, "Physical One-Way Functions," Ph.D. dissertation, Massachusetts Institute of Technology, 2001.
-
(2001)
Physical One-way Functions
-
-
Ravikanth, P.1
-
2
-
-
0037999043
-
Delay-based circuit authentication and applications
-
B. Gassend, D. Clarke, M. V. Dijk, and S. Devadas, "Delay-Based Circuit Authentication and Applications," in Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003, pp. 294-301.
-
(2003)
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC)
, pp. 294-301
-
-
Gassend, B.1
Clarke, D.2
Dijk, M.V.3
Devadas, S.4
-
4
-
-
33750726983
-
Read-proof hardware from protective coatings
-
Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings
-
P. Tuyls, G. Schrijen, B. Skoric, J. V. Geloven, N. Verhaegh, and R. Wolters, "Read-Proof Hardware from Protective Coatings," in Proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2006, pp. 369-383. (Pubitemid 44700070)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.-J.2
Skoric, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
5
-
-
67049156799
-
Novel PUF-based error detection methods in finite state machines
-
G. Hammouri, K. Akdemir, and B. Sunar, "Novel PUF-based Error Detection Methods in Finite State Machines," in Proceedings of the 11th International Conference on Information Security and Cryptology (ICISC), 2008, pp. 235-252.
-
(2008)
Proceedings of the 11th International Conference on Information Security and Cryptology (ICISC)
, pp. 235-252
-
-
Hammouri, G.1
Akdemir, K.2
Sunar, B.3
-
6
-
-
33750702480
-
Offline hardware/software authentication for reconfigurable platforms
-
Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings
-
E. Simpson and P. Schaumont, "Offline Hardware/Software Authentication for Reconfigurable Platforms," in Proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2006, pp. 311-323. (Pubitemid 44700066)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4249
, pp. 311-323
-
-
Simpson, E.1
Schaumont, P.2
-
7
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
J. Guajardo, S. Kumar, G. Schrijen, and P. Tuyls, "FPGA Intrinsic PUFs and Their Use for IP Protection," in Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2007, pp. 63-80.
-
(2007)
Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.3
Tuyls, P.4
-
8
-
-
56749170623
-
Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
-
Y. Alkabani, F. Koushanfar, N. Kiyavash, and M. Potkonjak, "Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach," in Proceedings of the 10th International Workshop on Information Hiding (IH), 2008, pp. 102-117.
-
(2008)
Proceedings of the 10th International Workshop on Information Hiding (IH)
, pp. 102-117
-
-
Alkabani, Y.1
Koushanfar, F.2
Kiyavash, N.3
Potkonjak, M.4
-
9
-
-
49149115221
-
Towards robust low cost authentication for pervasive devices
-
E. Ozturk, G. Hammouri, and B. Sunar, "Towards Robust Low Cost Authentication for Pervasive Devices," in Proceedings of the 6th IEEE International Conference on Pervasive Computing and Communications (PerCom), 2008, pp. 170-178.
-
(2008)
Proceedings of the 6th IEEE International Conference on Pervasive Computing and Communications (PerCom)
, pp. 170-178
-
-
Ozturk, E.1
Hammouri, G.2
Sunar, B.3
-
11
-
-
51749089495
-
Brand and IP protection with physical unclonable functions
-
J. Guajardo, S. Kumar, G. Schrijen, and P. Tuyls, "Brand and IP Protection with Physical Unclonable Functions," in Proceedings of the 2008 IEEE International Symposium on Circuits and Systems (ISCAS), 2008, pp. 3186-3189.
-
(2008)
Proceedings of the 2008 IEEE International Symposium on Circuits and Systems (ISCAS)
, pp. 3186-3189
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.3
Tuyls, P.4
-
12
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," SIAM Journal on Computing, vol. 38, no. 1, pp. 97-139, 2008.
-
(2008)
SIAM Journal on Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
13
-
-
72449124251
-
Memory leakage-resilient encryption based on physically unclonable functions
-
F. Armknecht, R. Maes, A. Sadeghi, B. Sunar, and P. Tuyls, "Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions," in Proceedings of the 15th International Conference on the Theory and Application of Cryptology & Information Security (ASI-ACRYPT), 2009, pp. 685-702.
-
(2009)
Proceedings of the 15th International Conference on the Theory and Application of Cryptology & Information Security (ASI-ACRYPT)
, pp. 685-702
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.3
Sunar, B.4
Tuyls, P.5
-
14
-
-
76949086041
-
On the foundations of physical unclonable functions
-
[Online]. Available
-
U. Rührmair, J. Sölter, and F. Sehnke, "On the Foundations of Physical Unclonable Functions," Cryptology ePrint Archive, Report 2009/277, 2009. [Online]. Available: http://eprint.iacr.org/2009/277.pdf
-
(2009)
Cryptology EPrint Archive, Report 2009/277
-
-
RüHrmair, U.1
SöLter, J.2
Sehnke, F.3
-
16
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
-
G. Suh and S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation," in Proceedings of the 44th IEEE/ACM Design Automation Conference (DAC), 2007, pp. 9-14. (Pubitemid 47129916)
-
(2007)
Proceedings - Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
17
-
-
84939573910
-
Differential power analysis
-
P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," in Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO), 1999, pp. 388-397.
-
(1999)
Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO)
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
19
-
-
23944463342
-
Template attacks
-
S. Chari, J. Rao, and P. Rohatgi, "Template Attacks," in Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2002, pp. 51-62.
-
(2002)
Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, pp. 51-62
-
-
Chari, S.1
Rao, J.2
Rohatgi, P.3
-
20
-
-
30844458593
-
A fuzzy vault scheme
-
DOI 10.1007/s10623-005-6343-z
-
A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237-257, 2006. (Pubitemid 43102559)
-
(2006)
Designs, Codes, and Cryptography
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
21
-
-
37849038363
-
Biometric fuzzy extractors made practical: A proposal based on FingerCodes
-
V. Tong, H. Sibert, J. Leceur, and M. Girault, "Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes," in Proceedings of the 2nd International Conference on Biometrics (ICB), 2007, pp. 604-613.
-
(2007)
Proceedings of the 2nd International Conference on Biometrics (ICB)
, pp. 604-613
-
-
Tong, V.1
Sibert, H.2
Leceur, J.3
Girault, M.4
-
22
-
-
0018456171
-
Universal hash functions
-
L. Carter and M. Wegman, "Universal Hash Functions," Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143-154, 1979.
-
(1979)
Journal of Computer and System Sciences
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, L.1
Wegman, M.2
-
24
-
-
51049117293
-
Efficient helper data key extractor on FPGAs
-
C. Bösch, J. Guajardo, A. Sadeghi, J. Shokrollahi, and P. Tuyls, "Efficient Helper Data Key Extractor on FPGAs," in Proceedings of the 10th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2008, pp. 181-197.
-
(2008)
Proceedings of the 10th International Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, pp. 181-197
-
-
Bösch, C.1
Guajardo, J.2
Sadeghi, A.3
Shokrollahi, J.4
Tuyls, P.5
|