메뉴 건너뛰기




Volumn , Issue , 2011, Pages 397-412

A formal foundation for the security features of physical functions

Author keywords

Formal security model; Physically Unclonable Function (PUF); Robustness; Unclonability; Unpredictability

Indexed keywords

HARDWARE SECURITY; PHYSICAL PROPERTIES; SECURITY SYSTEMS; SIDE CHANNEL ATTACK;

EID: 80051967839     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.10     Document Type: Conference Paper
Times cited : (137)

References (40)
  • 1
    • 3242749566 scopus 로고    scopus 로고
    • Ph.D. dissertation, Massachusetts Institute of Technology, March
    • R. S. Pappu, "Physical one-way functions," Ph.D. dissertation, Massachusetts Institute of Technology, March 2001.
    • (2001) Physical One-way Functions
    • Pappu, R.S.1
  • 7
    • 26444544536 scopus 로고    scopus 로고
    • Robust key extraction from physical uncloneable functions
    • Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
    • B. Škorić, P. Tuyls, and W. Ophey, "Robust key extraction from physical uncloneable functions," in Applied Cryptography and Network Security (ACNS), ser. LNCS, vol. 3531, 2005, pp. 407-422. (Pubitemid 41422130)
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 407-422
    • Skoric, B.1    Tuyls, P.2    Ophey, W.3
  • 10
    • 85177671623 scopus 로고    scopus 로고
    • November
    • Verayo, Inc., "Verayo product page," http://www.verayo.com/ product/products.html, November 2010.
    • (2010) Verayo Product Page
  • 11
    • 80051869122 scopus 로고    scopus 로고
    • November
    • Intrinsic ID, "Intrinsic ID product page," http://www. intrinsic-id.com/products/, November 2010.
    • (2010) Intrinsic ID Product Page
  • 13
    • 85016215043 scopus 로고    scopus 로고
    • Physically unclonable functions: A study on the state of the art and future research directions
    • D. Basin, U. Maurer, A.-R. Sadeghi, and D. Naccache, Eds. Springer Berlin Heidelberg
    • R. Maes and I. Verbauwhede, "Physically unclonable functions: A study on the state of the art and future research directions," in Towards Hardware-Intrinsic Security, ser. Information Security and Cryptography, D. Basin, U. Maurer, A.-R. Sadeghi, and D. Naccache, Eds. Springer Berlin Heidelberg, 2010, pp. 3-37.
    • (2010) Towards Hardware-intrinsic Security, Ser. Information Security and Cryptography , pp. 3-37
    • Maes, R.1    Verbauwhede, I.2
  • 17
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
    • G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Design Automation Conference, 2007, pp. 9-14. (Pubitemid 47129916)
    • (2007) Proceedings - Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 20
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication application
    • J. W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, "A technique to build a secret key in integrated circuits for identification and authentication application," in Symposium on VLSI Circuits, 2004, pp. 176-159.
    • (2004) Symposium on VLSI Circuits , pp. 176-159
    • Lee, J.W.1    Lim, D.2    Gassend, B.3    Suh, G.E.4    Van Dijk, M.5    Devadas, S.6
  • 26
  • 32
    • 77957133407 scopus 로고    scopus 로고
    • How to strongly link data and its medium: The paper case
    • P. Bulens, F.-X. Standaert, and J.-J. Quisquater, "How to strongly link data and its medium: the paper case," IET Information Security, vol. 4, no. 3, pp. 125-136, 2010.
    • (2010) IET Information Security , vol.4 , Issue.3 , pp. 125-136
    • Bulens, P.1    Standaert, F.-X.2    Quisquater, J.-J.3
  • 34
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology (EUROCRYPT, ser. LNCS, vol. 3027, 2004, pp. 523-540.
    • (2004) Advances in Cryptology (EUROCRYPT, Ser. LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 38
    • 67650675583 scopus 로고    scopus 로고
    • A leakage-resilient mode of operation
    • A. Joux, Ed. Springer
    • K. Pietrzak, "A leakage-resilient mode of operation," in Advances in Cryptology (EUROCRYPT), ser. LNCS, A. Joux, Ed., vol. 5479. Springer, 2009, pp. 462-482.
    • (2009) Advances in Cryptology (EUROCRYPT), Ser. LNCS , vol.5479 , pp. 462-482
    • Pietrzak, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.