메뉴 건너뛰기




Volumn 6841 LNCS, Issue , 2011, Pages 51-70

Physically uncloneable functions in the universal composition framework

Author keywords

[No Author keywords available]

Indexed keywords

HARDWARE SECURITY;

EID: 80051955337     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22792-9_4     Document Type: Conference Paper
Times cited : (98)

References (32)
  • 2
    • 72449124251 scopus 로고    scopus 로고
    • Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., Tuyls, P.: Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 685-702. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 685-702
    • Armknecht, F.1    Maes, R.2    Sadeghi, A.-R.3    Sunar, B.4    Tuyls, P.5
  • 3
    • 0022864717 scopus 로고
    • Information theoretic reductions among disclosure problems
    • IEEE, Los Alamitos
    • Brassard, G., Crépeau, C., Robert, J.-M.: Information theoretic reductions among disclosure problems. In: FOCS, pp. 168-173. IEEE, Los Alamitos (1986)
    • (1986) FOCS , pp. 168-173
    • Brassard, G.1    Crépeau, C.2    Robert, J.-M.3
  • 4
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145 (2001)
    • (2001) FOCS , pp. 136-145
    • Canetti, R.1
  • 5
    • 38049064364 scopus 로고    scopus 로고
    • Universally Composable Security with Global Setup
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Canetti, R., Dodis, Y., Pass, R., Walfish, S.: Universally Composable Security with Global Setup. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 61-85. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 61-85
    • Canetti, R.1    Dodis, Y.2    Pass, R.3    Walfish, S.4
  • 6
    • 84880897758 scopus 로고    scopus 로고
    • Universally composable commitments
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Canetti, R., Fischlin, M.: Universally composable commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19-40. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 7
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Universally composable notions of key exchange and secure channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 337-351. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 8
    • 35248819315 scopus 로고    scopus 로고
    • Universal Composition with Joint State
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Canetti, R., Rabin, T.: Universal Composition with Joint State. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 265-281. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 265-281
    • Canetti, R.1    Rabin, T.2
  • 9
    • 85030121757 scopus 로고
    • Equivalence between Two Flavours of Oblivious Transfers
    • Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
    • Crépeau, C.: Equivalence between Two Flavours of Oblivious Transfers. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 350-354. Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 350-354
    • Crépeau, C.1
  • 10
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38, 97-139 (2008)
    • (2008) SIAM J. Comput. , vol.38 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 11
    • 70350407160 scopus 로고    scopus 로고
    • Robust Authentication Using Physically Unclonable Functions
    • Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
    • Frikken, K.B., Blanton, M., Atallah, M.J.: Robust Authentication Using Physically Unclonable Functions. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 262-277. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5735 , pp. 262-277
    • Frikken, K.B.1    Blanton, M.2    Atallah, M.J.3
  • 13
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • ACM, New York
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
    • (1987) STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 14
    • 51849168583 scopus 로고    scopus 로고
    • One-Time Programs
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: One-Time Programs. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 39-56. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 39-56
    • Goldwasser, S.1    Kalai, Y.T.2    Rothblum, G.N.3
  • 15
    • 77957013832 scopus 로고    scopus 로고
    • Interactive Locking, Zero- Knowledge PCPs, and Unconditional Cryptography
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Goyal, V., Ishai, Y., Mahmoody, M., Sahai, A.: Interactive Locking, Zero- Knowledge PCPs, and Unconditional Cryptography. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 173-190. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 173-190
    • Goyal, V.1    Ishai, Y.2    Mahmoody, M.3    Sahai, A.4
  • 16
    • 77949605211 scopus 로고    scopus 로고
    • Founding Cryptography on Tamper-Proof Hardware Tokens
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Goyal, V., Ishai, Y., Sahai, A., Venkatesan, R.,Wadia, A.: Founding Cryptography on Tamper-Proof Hardware Tokens. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 308-326. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 308-326
    • Goyal, V.1    Ishai, Y.2    Sahai, A.3    Venkatesan, R.4    Wadia, A.5
  • 17
    • 38049015807 scopus 로고    scopus 로고
    • FPGA Intrinsic PUFs and Their Use for IP Protection
    • Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
    • Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4727 , pp. 63-80
    • Guajardo, J.1    Kumar, S.S.2    Schrijen, G.-J.3    Tuyls, P.4
  • 18
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364-1396 (1999)
    • (1999) SIAM J. Comput. , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 19
    • 70349276910 scopus 로고    scopus 로고
    • Constructions of truly practical secure protocols using standard smartcards
    • ACM, New York
    • Hazay, C., Lindell, Y.: Constructions of truly practical secure protocols using standard smartcards. In: ACM CCS, pp. 491-500. ACM, New York (2008)
    • (2008) ACM CCS , pp. 491-500
    • Hazay, C.1    Lindell, Y.2
  • 20
    • 77956761645 scopus 로고    scopus 로고
    • Universally composable zero-knowledge arguments and commitments from signature cards
    • Hofheinz, D., Unruh, D., Müller-Quade, J.: Universally composable zero-knowledge arguments and commitments from signature cards. Tatra Mt. Math. Pub., 93-103 (2007)
    • (2007) Tatra Mt. Math. Pub. , pp. 93-103
    • Hofheinz, D.1    Unruh, D.2    Müller-Quade, J.3
  • 21
    • 38049150653 scopus 로고    scopus 로고
    • Universally Composable Multi-party Computation Using Tamper-Proof Hardware
    • Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
    • Katz, J.: Universally Composable Multi-party Computation Using Tamper-Proof Hardware. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 115-128. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 115-128
    • Katz, J.1
  • 22
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • ACM, New York
    • Kilian, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20-31. ACM, New York (1988)
    • (1988) STOC , pp. 20-31
    • Kilian, J.1
  • 24
    • 44449101614 scopus 로고    scopus 로고
    • David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
    • Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
    • Moran, T., Segev, G.: David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 527-544. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 527-544
    • Moran, T.1    Segev, G.2
  • 25
    • 84937420653 scopus 로고    scopus 로고
    • Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Nielsen, J.B.: Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 111-126. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 111-126
    • Nielsen, J.B.1
  • 27
    • 3242749566 scopus 로고    scopus 로고
    • Phd thesis, Massachusetts Institut of Technology
    • Pappu, R.S.: Physical One-Way Functions. Phd thesis, Massachusetts Institut of Technology (2001)
    • (2001) Physical One-Way Functions
    • Pappu, R.S.1
  • 28
    • 77954743811 scopus 로고    scopus 로고
    • Oblivious Transfer Based on Physical Unclonable Functions
    • Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg
    • Rührmair, U.: Oblivious Transfer Based on Physical Unclonable Functions. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 430-440. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6101 , pp. 430-440
    • Rührmair, U.1
  • 29
    • 76949086041 scopus 로고    scopus 로고
    • On the foundations of physical unclonable functions
    • ePrint Archive, Report 2009/277
    • Rührmair, U., Sölter, J., Sehnke, F.: On the foundations of physical unclonable functions. Cryptology ePrint Archive, Report 2009/277 (2009)
    • (2009) Cryptology
    • Rührmair, U.1    Sölter, J.2    Sehnke, F.3
  • 31
    • 84964429179 scopus 로고    scopus 로고
    • An attack on puf-based session key exchange and a hardware-based countermeasure: Erasable pufs
    • Rührmair, C.J.U., Algasinger, M.: An attack on puf-based session key exchange and a hardware-based countermeasure: Erasable pufs. In: Proc. Financial Cryptoghraphy (2011)
    • Proc. Financial Cryptoghraphy (2011)
    • Rührmair, C.J.U.1    Algasinger, M.2
  • 32
    • 33746074792 scopus 로고    scopus 로고
    • Oblivious Transfer Is Symmetric
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Wolf, S., Wullschleger, J.: Oblivious Transfer Is Symmetric. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 222-232. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 222-232
    • Wolf, S.1    Wullschleger, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.