메뉴 건너뛰기




Volumn , Issue , 2011, Pages 242-247

Differential public physically unclonable functions: Architecture and applications

Author keywords

Authentication; hardware security; PPUF; PUF; smart cards

Indexed keywords

HARDWARE SECURITY; LOW COSTS; PPUF; PUF; SECURITY ATTACKS; ULTRA HIGH SPEED; ULTRA LOW POWER;

EID: 80052681348     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (46)

References (19)
  • 1
    • 79951864434 scopus 로고    scopus 로고
    • Trusted sensors and remote sensing
    • M. Potkonjak et al., "Trusted sensors and remote sensing", IEEE Sensors, pp. 1104-1107, 2010.
    • (2010) IEEE Sensors , pp. 1104-1107
    • Potkonjak, M.1
  • 2
    • 33748535403 scopus 로고    scopus 로고
    • High-performance CMOS variability in the 65-nm regime and beyond
    • K. Bernstein et al., "High-performance CMOS variability in the 65-nm regime and beyond," IBM Research and Development, vol. 50, nos. 4-5, pp. 433-450, 2006.
    • (2006) IBM Research and Development , vol.50 , Issue.4-5 , pp. 433-450
    • Bernstein, K.1
  • 3
    • 0041633858 scopus 로고    scopus 로고
    • Parameter variations and impact on circuits and microarchitecture
    • S. Borkar et al., "Parameter variations and impact on circuits and microarchitecture," DAC, pp. 338-342, 2003.
    • (2003) DAC , pp. 338-342
    • Borkar, S.1
  • 4
    • 0038341105 scopus 로고    scopus 로고
    • Silicon physical random functions
    • B. Gassend et al., "Silicon physical random functions,"ACM CCS, pp. 148-160, 2002.
    • (2002) ACM CCS , pp. 148-160
    • Gassend, B.1
  • 5
    • 62449274873 scopus 로고    scopus 로고
    • Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
    • J. Guajardo et al., "Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions," ISF, vol. 11, no. 1, pp. 19-41, 2009.
    • (2009) ISF , vol.11 , Issue.1 , pp. 19-41
    • Guajardo, J.1
  • 6
    • 70449096107 scopus 로고    scopus 로고
    • Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage
    • K. Kursawe et al., "Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage," HOST, pp. 22-29, 2009.
    • (2009) HOST , pp. 22-29
    • Kursawe, K.1
  • 7
    • 31344435929 scopus 로고    scopus 로고
    • Cryptographic processors-a survey
    • R. Anderson et al., "Cryptographic processors-a survey," IEEE Proceedings, vol. 94, no. 2, pp. 357-369, 2006.
    • (2006) IEEE Proceedings , vol.94 , Issue.2 , pp. 357-369
    • Anderson, R.1
  • 8
    • 70350469042 scopus 로고    scopus 로고
    • Hardware-based public-key cryptography with public physically Unclonable Functions
    • N. Beckmann and M. Potkonjak, "Hardware-based public-key cryptography with public physically Unclonable Functions," Info. Hiding, pp. 206-220, 2009.
    • (2009) Info. Hiding , pp. 206-220
    • Beckmann, N.1    Potkonjak, M.2
  • 9
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • G. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation,"DAC, pp. 9-14, 2007.
    • (2007) DAC , pp. 9-14
    • Suh, G.1    Devadas, S.2
  • 10
    • 77956221000 scopus 로고    scopus 로고
    • Gate-level characterization: Foundations and hardware security applications
    • S. Wei et al., "Gate-level characterization: foundations and hardware security applications," ACM/IEEE DAC, pp. 222-227, 2010.
    • (2010) ACM/IEEE DAC , pp. 222-227
    • Wei, S.1
  • 11
    • 78650884368 scopus 로고    scopus 로고
    • Scalable segmentation-based malicious circuitry detection and diagnosis
    • S. Wei and M. Potkonjak, "Scalable segmentation-based malicious circuitry detection and diagnosis, ICCAD, pp. 483-486, 2010.
    • (2010) ICCAD , pp. 483-486
    • Wei, S.1    Potkonjak, M.2
  • 12
    • 80052656793 scopus 로고    scopus 로고
    • Malicious Circuitry Detection Using Thermal Conditioning
    • S. Wei et al., "Malicious Circuitry Detection Using Thermal Conditioning," IEEE TIFS, 2011.
    • (2011) IEEE TIFS
    • Wei, S.1
  • 14
    • 80052682653 scopus 로고    scopus 로고
    • Integrated circuit security techniques using variable supply voltage
    • S. Wei and M. Potkonjak, "Integrated circuit security techniques using variable supply voltage," ACM/IEEE DAC, 2011.
    • (2011) ACM/IEEE DAC
    • Wei, S.1    Potkonjak, M.2
  • 15
    • 70350733802 scopus 로고    scopus 로고
    • Hardware Trojan horse detection using gate-level characterization
    • M. Potkonjak, et al., "Hardware Trojan horse detection using gate-level characterization," DAC, pp. 688-693, 2009.
    • (2009) DAC , pp. 688-693
    • Potkonjak, M.1
  • 16
    • 78549237663 scopus 로고    scopus 로고
    • Self-measurement of combinatorial circuit delays in FPGAs
    • J. S. J. Wong, P. Sedcole, and P. Y. K. Cheung, "Self-measurement of combinatorial circuit delays in FPGAs," TRETS, v. 2, n. 2, pp. 1-22, 2009.
    • (2009) TRETS , vol.2 , Issue.2 , pp. 1-22
    • Wong, J.S.J.1    Sedcole, P.2    Cheung, P.Y.K.3
  • 17
    • 80052675298 scopus 로고    scopus 로고
    • Low-cost gate-oxide early-life failure detection in robust systems
    • Y. Kim, et al., "Low-cost gate-oxide early-life failure detection in robust systems," VLSI Circuits Symposium, pp. 1-2, 2010.
    • (2010) VLSI Circuits Symposium , pp. 1-2
    • Kim, Y.1
  • 18
    • 37549010759 scopus 로고    scopus 로고
    • Circuit failure prediction and its application to transistor aging
    • M. Agarwal, B. Paul, M. Zhang, and S. Mitra, "Circuit failure prediction and its application to transistor aging," VTS, pp. 277-286, 2007.
    • (2007) VTS , pp. 277-286
    • Agarwal, M.1    Paul, B.2    Zhang, M.3    Mitra, S.4
  • 19
    • 80052662964 scopus 로고    scopus 로고
    • Device aging-based physically unclonable functions
    • S. Meguerdichian and M. Potkonjak, "Device aging-based physically unclonable functions,"ACM/IEEE DAC, 2011.
    • (2011) ACM/IEEE DAC
    • Meguerdichian, S.1    Potkonjak, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.