-
1
-
-
80051996433
-
A formal foundation for the security features of physical functions
-
To appear at
-
Armknecht, F., Maes, R., Sadeghi, A.-R., Standaert, F.-X., Wachsmann, C.: A formal foundation for the security features of physical functions. To appear at IEEE S&P (2011)
-
(2011)
IEEE S&P
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.-R.3
Standaert, F.-X.4
Wachsmann, C.5
-
2
-
-
72449124251
-
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., Tuyls, P.: Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 685-702. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 685-702
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.-R.3
Sunar, B.4
Tuyls, P.5
-
3
-
-
0022864717
-
Information theoretic reductions among disclosure problems
-
IEEE, Los Alamitos
-
Brassard, G., Crépeau, C., Robert, J.-M.: Information theoretic reductions among disclosure problems. In: FOCS, pp. 168-173. IEEE, Los Alamitos (1986)
-
(1986)
FOCS
, pp. 168-173
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.-M.3
-
4
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145 (2001)
-
(2001)
FOCS
, pp. 136-145
-
-
Canetti, R.1
-
5
-
-
38049064364
-
Universally Composable Security with Global Setup
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Canetti, R., Dodis, Y., Pass, R., Walfish, S.: Universally Composable Security with Global Setup. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 61-85. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 61-85
-
-
Canetti, R.1
Dodis, Y.2
Pass, R.3
Walfish, S.4
-
6
-
-
84880897758
-
Universally composable commitments
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Canetti, R., Fischlin, M.: Universally composable commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19-40. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
7
-
-
84947232363
-
Universally composable notions of key exchange and secure channels
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Universally composable notions of key exchange and secure channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 337-351. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
8
-
-
35248819315
-
Universal Composition with Joint State
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Canetti, R., Rabin, T.: Universal Composition with Joint State. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 265-281. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 265-281
-
-
Canetti, R.1
Rabin, T.2
-
9
-
-
85030121757
-
Equivalence between Two Flavours of Oblivious Transfers
-
Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
-
Crépeau, C.: Equivalence between Two Flavours of Oblivious Transfers. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 350-354. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 350-354
-
-
Crépeau, C.1
-
10
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38, 97-139 (2008)
-
(2008)
SIAM J. Comput.
, vol.38
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
11
-
-
70350407160
-
Robust Authentication Using Physically Unclonable Functions
-
Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
-
Frikken, K.B., Blanton, M., Atallah, M.J.: Robust Authentication Using Physically Unclonable Functions. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 262-277. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5735
, pp. 262-277
-
-
Frikken, K.B.1
Blanton, M.2
Atallah, M.J.3
-
12
-
-
39149145168
-
Controlled physical random functions and applications
-
Gassend, B., van Dijk, M., Clarke, D.E., Torlak, E., Devadas, S., Tuyls, P.: Controlled physical random functions and applications. ACM Trans. Inf. Syst. Secur. 10(4) (2008)
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.10
, pp. 4
-
-
Gassend, B.1
Van Dijk, M.2
Clarke, D.E.3
Torlak, E.4
Devadas, S.5
Tuyls, P.6
-
13
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
ACM, New York
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
51849168583
-
One-Time Programs
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: One-Time Programs. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 39-56. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 39-56
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
15
-
-
77957013832
-
Interactive Locking, Zero- Knowledge PCPs, and Unconditional Cryptography
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Goyal, V., Ishai, Y., Mahmoody, M., Sahai, A.: Interactive Locking, Zero- Knowledge PCPs, and Unconditional Cryptography. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 173-190. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 173-190
-
-
Goyal, V.1
Ishai, Y.2
Mahmoody, M.3
Sahai, A.4
-
16
-
-
77949605211
-
Founding Cryptography on Tamper-Proof Hardware Tokens
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Goyal, V., Ishai, Y., Sahai, A., Venkatesan, R.,Wadia, A.: Founding Cryptography on Tamper-Proof Hardware Tokens. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 308-326. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 308-326
-
-
Goyal, V.1
Ishai, Y.2
Sahai, A.3
Venkatesan, R.4
Wadia, A.5
-
17
-
-
38049015807
-
FPGA Intrinsic PUFs and Their Use for IP Protection
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
18
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364-1396 (1999)
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
19
-
-
70349276910
-
Constructions of truly practical secure protocols using standard smartcards
-
ACM, New York
-
Hazay, C., Lindell, Y.: Constructions of truly practical secure protocols using standard smartcards. In: ACM CCS, pp. 491-500. ACM, New York (2008)
-
(2008)
ACM CCS
, pp. 491-500
-
-
Hazay, C.1
Lindell, Y.2
-
20
-
-
77956761645
-
Universally composable zero-knowledge arguments and commitments from signature cards
-
Hofheinz, D., Unruh, D., Müller-Quade, J.: Universally composable zero-knowledge arguments and commitments from signature cards. Tatra Mt. Math. Pub., 93-103 (2007)
-
(2007)
Tatra Mt. Math. Pub.
, pp. 93-103
-
-
Hofheinz, D.1
Unruh, D.2
Müller-Quade, J.3
-
21
-
-
38049150653
-
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Katz, J.: Universally Composable Multi-party Computation Using Tamper-Proof Hardware. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 115-128. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 115-128
-
-
Katz, J.1
-
22
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
ACM, New York
-
Kilian, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20-31. ACM, New York (1988)
-
(1988)
STOC
, pp. 20-31
-
-
Kilian, J.1
-
24
-
-
44449101614
-
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Moran, T., Segev, G.: David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 527-544. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 527-544
-
-
Moran, T.1
Segev, G.2
-
25
-
-
84937420653
-
Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Nielsen, J.B.: Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 111-126. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 111-126
-
-
Nielsen, J.B.1
-
26
-
-
0037144430
-
Physical one-way functions
-
Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297, 2026-2030 (2002)
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
27
-
-
3242749566
-
-
Phd thesis, Massachusetts Institut of Technology
-
Pappu, R.S.: Physical One-Way Functions. Phd thesis, Massachusetts Institut of Technology (2001)
-
(2001)
Physical One-Way Functions
-
-
Pappu, R.S.1
-
28
-
-
77954743811
-
Oblivious Transfer Based on Physical Unclonable Functions
-
Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg
-
Rührmair, U.: Oblivious Transfer Based on Physical Unclonable Functions. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 430-440. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6101
, pp. 430-440
-
-
Rührmair, U.1
-
29
-
-
76949086041
-
On the foundations of physical unclonable functions
-
ePrint Archive, Report 2009/277
-
Rührmair, U., Sölter, J., Sehnke, F.: On the foundations of physical unclonable functions. Cryptology ePrint Archive, Report 2009/277 (2009)
-
(2009)
Cryptology
-
-
Rührmair, U.1
Sölter, J.2
Sehnke, F.3
-
30
-
-
85019715933
-
-
Springer, Heidelberg
-
Sadeghi, A.-R., Visconti, I., Wachsmann, C.: Enhancing RFID Security and Privacy by Physically Unclonable Functions. Towards Hardware-Intrinsic Security. Springer, Heidelberg (2010)
-
(2010)
Enhancing RFID Security and Privacy by Physically Unclonable Functions. Towards Hardware-Intrinsic Security
-
-
Sadeghi, A.-R.1
Visconti, I.2
Wachsmann, C.3
-
31
-
-
84964429179
-
An attack on puf-based session key exchange and a hardware-based countermeasure: Erasable pufs
-
Rührmair, C.J.U., Algasinger, M.: An attack on puf-based session key exchange and a hardware-based countermeasure: Erasable pufs. In: Proc. Financial Cryptoghraphy (2011)
-
Proc. Financial Cryptoghraphy (2011)
-
-
Rührmair, C.J.U.1
Algasinger, M.2
-
32
-
-
33746074792
-
Oblivious Transfer Is Symmetric
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Wolf, S., Wullschleger, J.: Oblivious Transfer Is Symmetric. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 222-232. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 222-232
-
-
Wolf, S.1
Wullschleger, J.2
|