-
2
-
-
4344584084
-
-
Master's thesis, Massachusetts Institute of Technology
-
B. Gassend, "Physical random functions," Master's thesis, Massachusetts Institute of Technology, 2003.
-
(2003)
Physical Random Functions
-
-
Gassend, B.1
-
3
-
-
0038341105
-
Silicon physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon physical random functions," in in Proceedings of Computer Communications Security Conf., 2002, pp. 148-160.
-
(2002)
Proceedings of Computer Communications Security Conf.
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
5
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
DOI 10.1109/TVLSI.2005.859470
-
D. Lim, J. W. Lee, B. Gassend, G. Suh, M. van Dijk, and S. Devadas, "Extracting secret keys from integrated circuits," IEEE Transactions on VLSI Systems, vol. 13, no. 10, pp. 1200-1205, October 2005. (Pubitemid 43131686)
-
(2005)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
6
-
-
0037144430
-
Physical one-way functions
-
R. Pappu, B. Recht, J. Taylor, and N. Gershen-Feld, "Physical one-way functions," Science, vol. 297, pp. 2026-2030, 2002.
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.1
Recht, B.2
Taylor, J.3
Gershen-Feld, N.4
-
7
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
-
DOI 10.1016/j.csi.2006.04.004, PII S092054890600064X
-
H. Chien and C. Chen, "Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 standards," Computer Standards & Interfaces, Elsevier Science Publishers, vol. 29, no. 2, pp. 254-259, February 2007. (Pubitemid 44829930)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.-Y.1
Chen, C.-H.2
-
8
-
-
24944575863
-
Cryptographic approach to "Privacy-friendly" tags
-
MIT, Massachusetts, USA, November
-
M. Ohkubo, K. Suzuki, and S. Kinoshita, "Cryptographic Approach to "Privacy-Friendly" Tags," in RFID Privacy Workshop, MIT, Massachusetts, USA, November 2003.
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
9
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
-
K. Rhee, J. Kwak, S. Kim, and D. Won, "Challenge-Response based RFID Authentication Protocol for Distributed Database Environment," in International Conference on Security in Pervasive Computing - SPC 2005, ser. Lecture Notes in Computer Science, D. Hutter and M. Ullmann, Eds., vol. 3450. Boppard, Germany: Springer-Verlag, April 2005, pp. 70-84. (Pubitemid 41274193)
-
(2005)
Lecture Notes in Computer Science
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
10
-
-
38149127568
-
Enhancing security of EPCglobal gen-2 RFID tag against traceability and cloning
-
Hiroshima, Japan, January
-
D. Nguyen Duc, J. Park, H. Lee, and K. Kim, "Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning," in Symposium on Cryptography and Information Security, Hiroshima, Japan, January 2006.
-
(2006)
Symposium on Cryptography and Information Security
-
-
Nguyen Duc, D.1
Park, J.2
Lee, H.3
Kim, K.4
-
11
-
-
56749103027
-
RFID authentication protocol for low-cost tags
-
WiSec'08, V. D. Gligor, J. Hubaux, and R. Poovendran, Eds. Alexandria, Virginia, USA: ACM Press, April
-
B. Song and C. J. Mitchell, "RFID Authentication Protocol for Low-cost Tags," in ACM Conference on Wireless Network Security, WiSec'08, V. D. Gligor, J. Hubaux, and R. Poovendran, Eds. Alexandria, Virginia, USA: ACM Press, April 2008, pp. 140-147.
-
(2008)
ACM Conference on Wireless Network Security
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
13
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
R. Sandhu and R. Thomas, Eds., IEEE. Orlando, Florida, USA: IEEE Computer Society, March
-
D. Henrici and P. Müller, "Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers," in International Workshop on Pervasive Computing and Communication Security - PerSec 2004, R. Sandhu and R. Thomas, Eds., IEEE. Orlando, Florida, USA: IEEE Computer Society, March 2004, pp. 149-153.
-
(2004)
International Workshop on Pervasive Computing and Communication Security - PerSec 2004
, pp. 149-153
-
-
Henrici, D.1
Müller, P.2
-
14
-
-
14844294769
-
Privacy and security in library RFID issues, practices, and architectures
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
D. Molnar and D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures," in Conference on Computer and Communications Security - ACM CCS, B. Pfitzmann and P. Liu, Eds., ACM. Washington, DC, USA: ACM Press, October 2004, pp. 210-219. (Pubitemid 40338202)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
15
-
-
49049105769
-
Design and implementation of puf-based "unclonable" RFID ICs for anti-counterfeiting and security applications
-
April
-
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal, "Design and implementation of puf-based "unclonable" RFID ICs for anti-counterfeiting and security applications," in Proceedings of the IEEE International Conference on RFID, April 2008, pp. 58-64.
-
(2008)
Proceedings of the IEEE International Conference on RFID
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
16
-
-
0037952426
-
-
Ph.D. dissertation, Massachusetts Institute of Technology
-
P. S. Ravikanth, "Physical one-way functions," Ph.D. dissertation, Massachusetts Institute of Technology, 2001.
-
(2001)
Physical One-way Functions
-
-
Ravikanth, P.S.1
-
17
-
-
33745654539
-
RFID-Tags for anti-counterfeiting
-
Topics in Cryptology - CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, Proceedings
-
P. Tuyls and L. Batina, "Rfid-tags for anti-counterfeiting," in Topics in Cryptology - CT-RSA 2006, volume 3860 of LNCS. Springer Verlag, 2006, pp. 115-131. (Pubitemid 43971705)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3960
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
18
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
17-19 June
-
J. Lee, L. Daihyun, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, "A technique to build a secret key in integrated circuits for identification and authentication applications," in Proceedings of the Symposium on VLSI Circuits, 17-19 June 2004.
-
(2004)
Proceedings of the Symposium on VLSI Circuits
-
-
Lee, J.1
Daihyun, L.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
19
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
San Diego, California, USA, June 4-8
-
G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Proceedings of the Design Automation Conference (DAC), San Diego, California, USA, June 4-8 2007.
-
(2007)
Proceedings of the Design Automation Conference (DAC)
-
-
Suh, G.E.1
Devadas, S.2
-
20
-
-
51749083449
-
Physical unclonable function with tristate buffers
-
Seattle, Washington, USA: IEEE, 18-21 May
-
E. Ozturk, G. Hammouri, and B. Sunar, "Physical unclonable function with tristate buffers," in Proceedings of the International Symposium on Circuits and Systems (ISCAS). Seattle, Washington, USA: IEEE, 18-21 May 2008, pp. 3194-3197.
-
(2008)
Proceedings of the International Symposium on Circuits and Systems (ISCAS)
, pp. 3194-3197
-
-
Ozturk, E.1
Hammouri, G.2
Sunar, B.3
-
21
-
-
79952821029
-
Design optimization and security validation of sub-threshold PUFs
-
Cologne, Germany
-
L. Lin, D. Holcomb, D. K. Krishnappa, P. Shabadi, and W. Burleson, "Design optimization and security validation of sub-threshold PUFs," in Proceedings of the Secure Component and System Identification Workshop (SECSI), Cologne, Germany, 2010.
-
(2010)
Proceedings of the Secure Component and System Identification Workshop (SECSI)
-
-
Lin, L.1
Holcomb, D.2
Krishnappa, D.K.3
Shabadi, P.4
Burleson, W.5
-
23
-
-
77951259594
-
An analysis of delay based puf implementations on fpga
-
P. Sirisuk, F. Morgan, T. El-Ghazawi, and H. Amano, Eds. Springer Berlin / Heidelberg
-
S. Morozov, A. Maiti, and P. Schaumont, "An analysis of delay based puf implementations on fpga," in Reconfigurable Computing: Architectures, Tools and pplications, ser. Lecture Notes in Computer Science, P. Sirisuk, F. Morgan, T. El-Ghazawi, and H. Amano, Eds. Springer Berlin / Heidelberg, 2010, vol. 5992, pp. 382-387.
-
(2010)
Reconfigurable Computing: Architectures, Tools and Pplications, Ser. Lecture Notes in Computer Science
, vol.5992
, pp. 382-387
-
-
Morozov, S.1
Maiti, A.2
Schaumont, P.3
|