메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Differential template attacks on PUF enabled cryptographic devices

Author keywords

[No Author keywords available]

Indexed keywords

BUILDING BLOCKES; CONDITIONAL EXECUTION; CRYPTOGRAPHIC DEVICES; DECODER IMPLEMENTATION; FUZZY EXTRACTORS; INITIAL STAGES; PHYSICAL UNCLONABLE FUNCTIONS; POWER CONSUMPTION; REED-SOLOMON; SIDE-CHANNEL; SIMPLE POWER ANALYSIS; SOFTWARE IMPLEMENTATION; SYNDROME DECODING; TEMPLATE ATTACKS; TIME SHIFTS;

EID: 79952517250     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WIFS.2010.5711445     Document Type: Conference Paper
Times cited : (52)

References (25)
  • 1
    • 0037952426 scopus 로고    scopus 로고
    • Ph.D. dissertation, Massachusetts Institute of Technology
    • P. Ravikanth, "Physical One-Way Functions," Ph.D. dissertation, Massachusetts Institute of Technology, 2001.
    • (2001) Physical One-way Functions
    • Ravikanth, P.1
  • 12
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," SIAM Journal on Computing, vol. 38, no. 1, pp. 97-139, 2008.
    • (2008) SIAM Journal on Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 16
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
    • G. Suh and S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation," in Proceedings of the 44th IEEE/ACM Design Automation Conference (DAC), 2007, pp. 9-14. (Pubitemid 47129916)
    • (2007) Proceedings - Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 20
    • 30844458593 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • DOI 10.1007/s10623-005-6343-z
    • A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237-257, 2006. (Pubitemid 43102559)
    • (2006) Designs, Codes, and Cryptography , vol.38 , Issue.2 , pp. 237-257
    • Juels, A.1    Sudan, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.