메뉴 건너뛰기




Volumn 6, Issue 3 PART 2, 2011, Pages 1123-1135

Time-bounded authentication of FPGAs

Author keywords

Delay characterization; field programmable gate arrays (FPGAs); physically unclonable function (PUF); time bounded authentication

Indexed keywords

AUTHENTICATION PROTOCOLS; BUILDING BLOCKES; CLOCK FREQUENCY; DELAY CHARACTERIZATION; LINEAR CALIBRATION; NOVEL TECHNIQUES; ON-CHIP TEMPERATURE; OPERATIONAL CONDITIONS; PHYSICALLY UNCLONABLE FUNCTION (PUF); PROOF OF CONCEPT; PULSEWIDTHS; RECONFIGURABILITY; SIGNATURE EXTRACTION; TIME CONSTRAINTS; TIME-BOUNDED AUTHENTICATION; VARIOUS ATTACKS; VOLTAGE SENSOR; VOLTAGE VARIATION;

EID: 80051746634     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2131133     Document Type: Article
Times cited : (58)

References (27)
  • 3
    • 37149044968 scopus 로고    scopus 로고
    • Aegis: A single-chip secure processor
    • DOI 10.1109/MDT.2007.179
    • G. Suh, C. O'Donnell, and S. Devadas, "AEGIS: A single-chip secure processor", IEEE Design Test Comput., vol. 24, no. 6, pp. 570-580, Nov./Dec. 2007. (Pubitemid 350253575)
    • (2007) IEEE Design and Test of Computers , vol.24 , Issue.6 , pp. 570-580
    • Suh, G.E.1    O'Donnell, C.W.2    Devadas, S.3
  • 4
    • 70349252061 scopus 로고    scopus 로고
    • Binding software to specific native hardware in a VM environment: The PUF challenge and opportunity
    • M. Atallah, E. Bryant, J. Korb, and J. Rice, "Binding software to specific native hardware in a VM environment: The PUF challenge and opportunity", in Proc. Workshop on Virtual Machine Security, 2008, pp. 45-48.
    • (2008) Proc. Workshop on Virtual Machine Security , pp. 45-48
    • Atallah, M.1    Bryant, E.2    Korb, J.3    Rice, J.4
  • 6
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
    • G. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation", in Proc. Design Automation Conference (DAC), 2007, pp. 9-14. (Pubitemid 47129916)
    • (2007) Proceedings - Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 7
    • 76949093125 scopus 로고    scopus 로고
    • Techniques for design and implementation of secure reconfigurable PUFS
    • M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Techniques for design and implementation of secure reconfigurable PUFS", ACM Trans. Reconfig. Technol. Syst., vol. 2, no. 1, pp. 1-33, 2009.
    • (2009) ACM Trans. Reconfig. Technol. Syst. , vol.2 , Issue.1 , pp. 1-33
    • Majzoobi, M.1    Koushanfar, F.2    Potkonjak, M.3
  • 9
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication applications
    • J. Lee, L. Daihyun, B. Gassend, G. Suh, M. van Dijk, and S. Devadas, "A technique to build a secret key in integrated circuits for identification and authentication applications", in Symp. VLSI, 2004, pp. 176-179.
    • (2004) Symp. VLSI , pp. 176-179
    • Lee, J.1    Daihyun, L.2    Gassend, B.3    Suh, G.4    Van Dijk, M.5    Devadas, S.6
  • 10
    • 68949175522 scopus 로고    scopus 로고
    • Power-up SRAM state as an identifying fingerprint and source of true random numbers
    • Sep.
    • D. Holcomb, W. Burleson, and K. Fu, "Power-up SRAM state as an identifying fingerprint and source of true random numbers", IEEE Trans. Comput., vol. 58, no. 9, pp. 1198-1210, Sep. 2009.
    • (2009) IEEE Trans. Comput. , vol.58 , Issue.9 , pp. 1198-1210
    • Holcomb, D.1    Burleson, W.2    Fu, K.3
  • 13
    • 77950450649 scopus 로고    scopus 로고
    • SIMPL system: On a public key variant of physical unclonable function
    • Rep. 2009/255
    • U. Ruhrmair, SIMPL system: On a public key variant of physical unclonable function, Cryptology ePrint Archive, Rep. 2009/255, 2009.
    • (2009) Cryptology EPrint Archive
    • Ruhrmair, U.1
  • 18
  • 22
    • 79951644967 scopus 로고    scopus 로고
    • Rapid FPGA delay characterization using clock synthesis and sparse sampling
    • to be published
    • M. Majzoobi, E. Dyer, A. Elnably, and F. Koushanfar, "Rapid FPGA delay characterization using clock synthesis and sparse sampling", in Proc. Int. Test Conf. (ITC), 2010, to be published.
    • (2010) Proc. Int. Test Conf. (ITC)
    • Majzoobi, M.1    Dyer, E.2    Elnably, A.3    Koushanfar, F.4
  • 24
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data", in Proc. EUROCRYPT, 2004, pp. 523-540.
    • (2004) Proc. EUROCRYPT , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 26
    • 70350469042 scopus 로고    scopus 로고
    • Hardware-based public-key cryptography with public physically unclonable functions
    • N. Beckmann and M. Potkonjak, "Hardware-based public-key cryptography with public physically unclonable functions", in Proc. Information Hiding Conf. (IH), 2009, pp. 206-220.
    • (2009) Proc. Information Hiding Conf. (IH) , pp. 206-220
    • Beckmann, N.1    Potkonjak, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.