-
1
-
-
0037144430
-
Physical one-way functions
-
R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, "Physical one-way functions," Science, vol. 297, pp. 2026-2030, 2002.
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
2
-
-
0038341105
-
Silicon physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon physical random functions," in CCS, 2002, pp. 148-160.
-
(2002)
CCS
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
3
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
J. Guajardo, S. Kumar, G. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," in CHES, 2007, pp. 63-80.
-
(2007)
CHES
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.3
Tuyls, P.4
-
4
-
-
51849144293
-
The butterfly PUF protecting IP on every FPGA
-
S. Kumar, J. Guajardo, R. Maes, G.-J. Schrijen, and P. Tuyls, "The butterfly PUF protecting IP on every FPGA," in HOST, 2008, pp. 67-70.
-
(2008)
HOST
, pp. 67-70
-
-
Kumar, S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.-J.4
Tuyls, P.5
-
5
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
-
G. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in DAC, 2007, pp. 9-14. (Pubitemid 47129916)
-
(2007)
Proceedings - Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
6
-
-
27544441530
-
Design and implementation of the AEGIS single-chip secure processor using physical random functions
-
Proceedings - 32nd International Symposium on Computer Architecture, ISCA 2005
-
G. Suh, C. O'Donnell, I. Sachdev, and S. Devadas, "Design and implementation of the AEGIS single-chip secure processor using physical random functions," in ISCA, 2005, pp. 25-36. (Pubitemid 41543428)
-
(2005)
Proceedings - International Symposium on Computer Architecture
, pp. 25-36
-
-
Suh, G.E.1
O'Donnell, C.W.2
Sachdev, I.3
Devadas, S.4
-
7
-
-
76949093125
-
Techniques for design and implementation of secure reconfigurable PUFs
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Techniques for design and implementation of secure reconfigurable PUFs," TRETS, vol. 2, no. 1, pp. 1-33, 2009.
-
(2009)
TRETS
, vol.2
, Issue.1
, pp. 1-33
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
8
-
-
49749144533
-
Remote activation of ICS for piracy prevention and digital right management
-
Y. Alkabani, F. Koushanfar, and M. Potkonjak, "Remote activation of ICS for piracy prevention and digital right management," in International Conference on Computer Aided Design (ICCAD), 2007, pp. 674-677.
-
(2007)
International Conference on Computer Aided Design (ICCAD)
, pp. 674-677
-
-
Alkabani, Y.1
Koushanfar, F.2
Potkonjak, M.3
-
9
-
-
85077688405
-
Active hardware metering for intellectual property protection and security
-
Y. M. Alkabani and F. Koushanfar, "Active hardware metering for intellectual property protection and security," in USENIX Security Symposium, 2007, pp. 1-16.
-
(2007)
USENIX Security Symposium
, pp. 1-16
-
-
Alkabani, Y.M.1
Koushanfar, F.2
-
11
-
-
80051747707
-
FPGA time-bounded unclonable authentication
-
M. Majzoobi, A. Elnably, and F. Koushanfar, "FPGA time-bounded unclonable authentication," in IH, 2010.
-
(2010)
IH
-
-
Majzoobi, M.1
Elnably, A.2
Koushanfar, F.3
-
12
-
-
77950450649
-
SIMPL system: On a public key variant of physical unclonable function
-
U. Rührmair, "SIMPL system: on a public key variant of physical unclonable function," Cryptology ePrint Archive, 2009.
-
(2009)
Cryptology EPrint Archive
-
-
RüHrmair, U.1
-
13
-
-
70350469042
-
Hardware-based public-key cryptography with public physically unclonable functions
-
N. Beckmann and M. Potkonjak, "Hardware-based public-key cryptography with public physically unclonable functions," in IH, 2009, pp. 206-220.
-
(2009)
IH
, pp. 206-220
-
-
Beckmann, N.1
Potkonjak, M.2
-
14
-
-
77950424396
-
On-chip electric waves: An analog circuit approach to physical uncloneable functions
-
G. Csaba, X. Ju, Q. Chen, W. Porod, J. Schmidhuber, U. Schlichtmann, P. Lugli, and U. Rührmair, "On-chip electric waves: An analog circuit approach to physical uncloneable functions," Cryptology ePrint Archive, 2009.
-
(2009)
Cryptology EPrint Archive
-
-
Csaba, G.1
Ju, X.2
Chen, Q.3
Porod, W.4
Schmidhuber, J.5
Schlichtmann, U.6
Lugli, P.7
RüHrmair, U.8
-
15
-
-
77952336010
-
Random pn-junctions for physical cryptography
-
C. Jaeger, M. Algasinger, U. Ruhrmair, G. Csaba, and M. Stutzmann, "Random pn-junctions for physical cryptography," Applied Physics Letters, vol. 96, no. 17, pp. 172 103-172 103-3, 2010.
-
(2010)
Applied Physics Letters
, vol.96
, Issue.17
, pp. 172103-1721033
-
-
Jaeger, C.1
Algasinger, M.2
Ruhrmair, U.3
Csaba, G.4
Stutzmann, M.5
-
16
-
-
79952492837
-
Rapid FPGA characterzation using clock synthesis and signal sparsity
-
M. Majzoobi, E. Dyer, A. Elnably, and F. Koushanfar, "Rapid FPGA characterzation using clock synthesis and signal sparsity," in ITC, 2010.
-
(2010)
ITC
-
-
Majzoobi, M.1
Dyer, E.2
Elnably, A.3
Koushanfar, F.4
-
17
-
-
67249147207
-
Testing techniques for hardware security
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Testing techniques for hardware security," in ITC, 2008, pp. 1-10.
-
(2008)
ITC
, pp. 1-10
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
18
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
DOI 10.1109/TVLSI.2005.859470
-
L. Daihyun, J. Lee, B. Gassend, G. Suh, M. van Dijk, and S. Devadas, "Extracting secret keys from integrated circuits," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 13, no. 10, pp. 1200 - 1205, 2005. (Pubitemid 43131686)
-
(2005)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
19
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
U. Rhrmair, F. Sehnke, J. Slter, G. Dror, S. Devadas, and J. Schmidhuber, "Modeling attacks on physical unclonable functions," in Conference on Computer and Communications Security, 2010.
-
(2010)
Conference on Computer and Communications Security
-
-
Rhrmair, U.1
Sehnke, F.2
Slter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
|