-
2
-
-
0034428343
-
IC identification circuit using device mismatch
-
K. Lofstrom, W. R. Daasch, and D. Taylor, "IC identification circuit using device mismatch," IEEE Intl. Solid-State Circuits Conf. (ISSCC 00), Digest of Technical Papers, Feb. 2000, pp. 372-373. (Pubitemid 32864183)
-
(2000)
Digest of Technical Papers - IEEE International Solid-State Circuits Conference
, pp. 372-373
-
-
Lofstrom, K.1
Daasch, W.R.2
Taylor, D.3
-
4
-
-
0037144430
-
Physical one-way functions
-
Sep.
-
R. S. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, "Physical one-way functions," Science, vol. 297, Sep. 2002, pp. 2026-2030.
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.S.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
5
-
-
0038341105
-
Silicon physical random functions
-
ACM Press, Nov.
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon physical random functions," Proc. ACM Conf. on Computer and Communications Security, ACM Press, Nov. 2002, pp. 148-160.
-
(2002)
Proc. ACM Conf. on Computer and Communications Security
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
6
-
-
76949086041
-
On the foundations of physical unclonable functions
-
U. Rührmair, J. Sölter, and F. Sehnke, "On the foundations of physical unclonable functions," Cryptology ePrint Archive, Report 277, 2009.
-
(2009)
Cryptology EPrint Archive, Report
, vol.277
-
-
Rührmair, U.1
Sölter, J.2
Sehnke, F.3
-
7
-
-
85016215043
-
Physically unclonable functions: A study on the state of the art and future research directions
-
Springer-Verlag
-
R. Maes and I. Verbauwhede, "Physically unclonable functions: a study on the state of the art and future research directions," in Towards Hardware-Intrinsic Security, Springer-Verlag, 2010, pp. 3-37.
-
(2010)
Towards Hardware-Intrinsic Security
, pp. 3-37
-
-
Maes, R.1
Verbauwhede, I.2
-
8
-
-
84903837858
-
Strong PUFs: Models, constructions, and security proofs
-
Springer-Verlag
-
U. Rührmair, H. Busch, and S. Katzenbeisser, "Strong PUFs: models, constructions, and security proofs," in Towards Hardware-Intrinsic Security, Springer-Verlag, 2010, pp. 79-96.
-
(2010)
Towards Hardware-Intrinsic Security
, pp. 79-96
-
-
Rührmair, U.1
Busch, H.2
Katzenbeisser, S.3
-
9
-
-
80051987266
-
-
Side Channel Attacks Database, http://www.sidechannelattacks.com/.
-
-
-
-
10
-
-
79957692700
-
Security based on physical unclonability and disorder
-
Springer-Verlag, in press
-
U. Rührmair, S. Devadas, and F. Koushanfar, "Security based on physical unclonability and disorder," in Introduction to Hardware Security and Trust, Springer-Verlag, in press.
-
Introduction to Hardware Security and Trust
-
-
Rührmair, U.1
Devadas, S.2
Koushanfar, F.3
-
11
-
-
23444439038
-
AEGIS: A single-chip secure processor
-
DOI 10.1016/j.istr.2005.05.002, PII S1363412705000208
-
G. E. Suh, C. W. O'Donnell, and S. Devadas, "AEGIS: a single-chip secure processor," Information Security, vol. 10, 2005, pp. 63-73. (Pubitemid 41108379)
-
(2005)
Information Security Technical Report
, vol.10
, Issue.2
, pp. 63-73
-
-
Suh, G.E.1
O'Donnell, C.W.2
Devadas, S.3
-
12
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
J. Guajardo, S. S. Kumar, G. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," Proc. Intl. Workshop on Cryptographic Hardware and Embedded Systems (CHES 07), 2007, pp. 63-80.
-
(2007)
Proc. Intl. Workshop on Cryptographic Hardware and Embedded Systems (CHES 07)
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.3
Tuyls, P.4
-
13
-
-
77955726618
-
Sensor physical unclonable functions
-
IEEE Press, Jun.
-
K. Rosenfeld, E. Gavas, and R. Karri, "Sensor physical unclonable functions," IEEE Intl. Symp. on Hardware-Oriented Security and Trust (HOST 2010), IEEE Press, Jun. 2010, pp. 112-117.
-
(2010)
IEEE Intl. Symp. on Hardware-Oriented Security and Trust (HOST 2010)
, pp. 112-117
-
-
Rosenfeld, K.1
Gavas, E.2
Karri, R.3
-
14
-
-
70449487684
-
A soft decision helper data algorithm for SRAM PUFs
-
IEEE Press, Jun.
-
R. Maes, P. Tuyls, and I. Verbauwhede, "A soft decision helper data algorithm for SRAM PUFs," IEEE Intl. Symp. on Information Theory (ISIT 09), IEEE Press, Jun. 2009, pp. 2101-2105.
-
(2009)
IEEE Intl. Symp. on Information Theory (ISIT 09)
, pp. 2101-2105
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
15
-
-
76949095784
-
Secure and robust error correction for physical unclonable functions
-
Jan.
-
M. Yu and S. Devadas, "Secure and robust error correction for physical unclonable functions," IEEE Des. Test. Comput., Jan. 2010, pp. 48-64.
-
(2010)
IEEE Des. Test. Comput.
, pp. 48-64
-
-
Yu, M.1
Devadas, S.2
-
16
-
-
77950450649
-
SIMPL systems: On a public key variant of physical unclonable functions
-
U. Rührmair, "SIMPL systems: on a public key variant of physical unclonable functions," Cryptology ePrint Archive, Report 255, 2009.
-
(2009)
Cryptology EPrint Archive, Report
, vol.255
-
-
Rührmair, U.1
-
17
-
-
77950455745
-
Analog circuits for physical cryptography
-
Dec.
-
Q. Chen, G. Csaba, X. Ju, S. B. Natarajan, P. Lugli, M. Stutzmann, et al., "Analog circuits for physical cryptography," Proc. IEEE Intl. Symp. of Integrated Circuits (ISIC 09), Dec. 2009, pp. 121-124.
-
(2009)
Proc. IEEE Intl. Symp. of Integrated Circuits (ISIC 09)
, pp. 121-124
-
-
Chen, Q.1
Csaba, G.2
Ju, X.3
Natarajan, S.B.4
Lugli, P.5
Stutzmann, M.6
-
18
-
-
78951492926
-
Circuit-based approaches to SIMPL systems
-
Q. Chen, G. Csaba, P. Lugli, U. Schlichtmann, M. Stutzmann, and U. Rührmair, "Circuit-based approaches to SIMPL systems," Journal of Circuits, Systems, and Computers, vol. 20, 2011, pp. 107-123.
-
(2011)
Journal of Circuits, Systems, and Computers
, vol.20
, pp. 107-123
-
-
Chen, Q.1
Csaba, G.2
Lugli, P.3
Schlichtmann, U.4
Stutzmann, M.5
Rührmair, U.6
-
19
-
-
77952339214
-
Application of mismatched cellular nonlinear networks for physical cryptography
-
Feb.
-
G. Csaba, X. Ju, Z. Ma, Q. Chen, W. Porod, J. Schmidhuber, et al., "Application of mismatched cellular nonlinear networks for physical cryptography," Proc. IEEE Intl. Workshop on Cellular Nanoscale Networks and Their Applications (CNNA 2010), Feb. 2010, pp. 1-6.
-
(2010)
Proc. IEEE Intl. Workshop on Cellular Nanoscale Networks and Their Applications (CNNA 2010)
, pp. 1-6
-
-
Csaba, G.1
Ju, X.2
Ma, Z.3
Chen, Q.4
Porod, W.5
Schmidhuber, J.6
-
21
-
-
70350469042
-
Hardware-based public-key cryptography with public physically unclonable functions
-
Jun.
-
N. Beckmann and M. Potkonjak, "Hardware-based public-key cryptography with public physically unclonable functions," Intl. Workshop on Information Hiding (IH 09), Jun. 2009, pp. 206-220.
-
(2009)
Intl. Workshop on Information Hiding (IH 09)
, pp. 206-220
-
-
Beckmann, N.1
Potkonjak, M.2
-
22
-
-
78549254941
-
FPGA time-bounded unclonable authentication
-
Jun.
-
M. Majzoobi, A. Elnably, and F. Koushanfar, "FPGA time-bounded unclonable authentication," Intl. Conf. on Information Hiding (IH 2010), Jun. 2010, pp. 1-16.
-
(2010)
Intl. Conf. on Information Hiding (IH 2010)
, pp. 1-16
-
-
Majzoobi, M.1
Elnably, A.2
Koushanfar, F.3
-
23
-
-
33750726983
-
Read-proof hardware from protective coatings
-
Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings
-
P. Tuyls, G. Schrijen, B. Škorić, J. van Geloven, N. Verhaegh, and R. Wolters, "Read-proof hardware from protective coatings," Proc. Intl. Workshop on Cryptographic Hardware and Embedded Systems (CHES 06), 2006, pp. 369-383. (Pubitemid 44700070)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.-J.2
Skoric, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
25
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
-
G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secure key generation," Proc. ACM/IEEE Design Automation Conf. (DAC 07), ACM Press, Jun. 2007, pp. 9-14. (Pubitemid 47129916)
-
(2007)
Proceedings - Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
26
-
-
51849144293
-
The butterfly PUF protecting IP on every FPGA
-
IEEE Press
-
S. Kumar, J. Guajardo, R. Maes, G. J. Schrijen, and P. Tuyls, "The butterfly PUF protecting IP on every FPGA," Proc. IEEE Intl. Workshop on Hardware-Oriented Security and Trust (CHES 08), IEEE Press, 2008, pp. 67-70.
-
(2008)
Proc. IEEE Intl. Workshop on Hardware-Oriented Security and Trust (CHES 08)
, pp. 67-70
-
-
Kumar, S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.J.4
Tuyls, P.5
-
28
-
-
57849102046
-
Lightweight secure PUFs
-
IEEE Press
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Lightweight secure PUFs," Proc. Intl. Conf. on Computer-Aided Design, IEEE Press, 2008, pp. 670-673.
-
(2008)
Proc. Intl. Conf. on Computer-Aided Design
, pp. 670-673
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
29
-
-
70350741520
-
A physical unclonable function defined using power distribution system equivalent resistance variations
-
ACM Press, Jul.
-
R. Helinski, D. Acharyya, and J. Plusquellic, "A physical unclonable function defined using power distribution system equivalent resistance variations," Proc. ACM/IEEE Design Automation Conf. (DAC 09), ACM Press, Jul. 2009, pp. 676-681.
-
(2009)
Proc. ACM/IEEE Design Automation Conf. (DAC 09)
, pp. 676-681
-
-
Helinski, R.1
Acharyya, D.2
Plusquellic, J.3
-
30
-
-
51749083449
-
Physical unclonable function with tristate buffers
-
IEEE Press, May
-
E. Ozturk, G. Hammouri, and B. Sunar, "Physical unclonable function with tristate buffers," Proc. IEEE Intl. Symp. on Circuits and Systems (ISCAS 08), IEEE Press, May 2008, pp. 3194-3197.
-
(2008)
Proc. IEEE Intl. Symp. on Circuits and Systems (ISCAS 08)
, pp. 3194-3197
-
-
Ozturk, E.1
Hammouri, G.2
Sunar, B.3
-
31
-
-
67249147207
-
Testing techniques for hardware security
-
Oct.
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Testing techniques for hardware security," IEEE Intl. Test Conf. (ITC 08), Oct. 2008, pp. 1-10.
-
(2008)
IEEE Intl. Test Conf. (ITC 08)
, pp. 1-10
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
32
-
-
77955766025
-
A large scale characterization of RO-PUF
-
Jun.
-
A. Maiti, J. Casarona, L. McHale, and P. Schaumont, "A large scale characterization of RO-PUF," IEEE Intl. Symp. on Hardware-Oriented Security and Trust (HOST 2010), Jun. 2010, pp. 94-99.
-
(2010)
IEEE Intl. Symp. on Hardware-Oriented Security and Trust (HOST 2010)
, pp. 94-99
-
-
Maiti, A.1
Casarona, J.2
McHale, L.3
Schaumont, P.4
-
33
-
-
68949175522
-
Power-up SRAM state as an identifying fingerprint and source of true random numbers
-
D. E. Holcomb, W. P. Burleson, and K. Fu, "Power-up SRAM state as an identifying fingerprint and source of true random numbers," IEEE Trans. Comput., vol. 58, 2009, pp. 1198-1210.
-
(2009)
IEEE Trans. Comput.
, vol.58
, pp. 1198-1210
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
34
-
-
80051960732
-
Analysis of a ring oscillator based on chip thermal sensor in 65nm technology
-
B. Datta and D. Kumar, "Analysis of a ring oscillator based on chip thermal sensor in 65nm technology," Report, UMass Amherst, 2005.
-
(2005)
Report, UMass Amherst
-
-
Datta, B.1
Kumar, D.2
-
35
-
-
77954692234
-
Applications of high-capacity crossbar memories in cryptography
-
U. Rührmair, C. Jäger, M. Bator, M. Stutzmann, P. Lugli, and G. Csaba, "Applications of High-Capacity Crossbar Memories in Cryptography," IEEE Trans. Nanotechnol., vol. 9, 2010.
-
(2010)
IEEE Trans. Nanotechnol.
, vol.9
-
-
Rührmair, U.1
Jäger, C.2
Bator, M.3
Stutzmann, M.4
Lugli, P.5
Csaba, G.6
|