-
1
-
-
80053511717
-
Design of cryptographic devices resilient to fault injection attacks using nonlinear robust codes
-
Akdemir, K.D., Wang, Z., Karpovsky, M.G., Sunar, B.: Design of cryptographic devices resilient to fault injection attacks using nonlinear robust codes. In: Fault Analysis in Cryptography (2011)
-
(2011)
Fault Analysis in Cryptography
-
-
Akdemir, K.D.1
Wang, Z.2
Karpovsky, M.G.3
Sunar, B.4
-
2
-
-
80051967839
-
A formal foundation for the security features of physical functions
-
IEEE Computer Society, Los Alamitos
-
Armknecht, F., Maes, R., Sadeghi, A.R., Standaert, F.X., Wachsmann, C.: A formal foundation for the security features of physical functions. In: IEEE Symposium on Security and Privacy, pp. 397-412. IEEE Computer Society, Los Alamitos (2011)
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 397-412
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.R.3
Standaert, F.X.4
Wachsmann, C.5
-
3
-
-
72449124251
-
Memory leakage-resilient encryption based on physically unclonable functions
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Armknecht, F., Maes, R., Sadeghi, A.R., Sunar, B., Tuyls, P.: Memory leakage-resilient encryption based on physically unclonable functions. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 685-702. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 685-702
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.R.3
Sunar, B.4
Tuyls, P.5
-
4
-
-
78650151843
-
On RFID privacy with mutual authentication and tag corruption
-
Zhou, J., Yung, M. (eds.) ACNS 2010. Springer, Heidelberg
-
Armknecht, F., Sadeghi, A.R., Visconti, I., Wachsmann, C.: On RFID privacy with mutual authentication and tag corruption. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 493-510. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6123
, pp. 493-510
-
-
Armknecht, F.1
Sadeghi, A.R.2
Visconti, I.3
Wachsmann, C.4
-
5
-
-
37149045263
-
PRESENT: An ultra-lightweight block cipher
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Bogdanov, A., Knudsen, L., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: An ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450-466. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 450-466
-
-
Bogdanov, A.1
Knudsen, L.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.6
Seurin, Y.7
Vikkelsoe, C.8
-
6
-
-
80053481128
-
-
April
-
Californians Against Waste: E-waste laws in other states (April 2011), http://www.cawrecycles.org/issues/ca-e-waste/other-states
-
(2011)
E-waste Laws in Other States
-
-
-
7
-
-
80053524715
-
-
Website April
-
Calypso Networks Association: Website (April 2011), http://www. calypsonet-asso.org/
-
(2011)
-
-
-
8
-
-
58149096831
-
Algebraic attacks on the Crypto-1 stream cipher in MiFare Classic and Oyster Cards
-
Report 2008/166
-
Courtois, N.T., Nohl, K., O'Neil, S.: Algebraic attacks on the Crypto-1 stream cipher in MiFare Classic and Oyster Cards. Cryptology ePrint Archive, Report 2008/166 (2008)
-
(2008)
Cryptology ePrint Archive
-
-
Courtois, N.T.1
Nohl, K.2
O'Neil, S.3
-
10
-
-
57049128814
-
Dismantling MIFARE classic
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Garcia, F.D., De Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R.W., Jacobs, B.: Dismantling MIFARE classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97-114. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 97-114
-
-
Garcia, F.D.1
De Koning Gans, G.2
Muijrers, R.3
Van Rossum, P.4
Verdult, R.5
Schreur, R.W.6
Jacobs, B.7
-
11
-
-
46449138830
-
Controlled physical random functions
-
IEEE Computer Society, Los Alamitos
-
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled physical random functions. In: Computer Security Applications Conference, pp. 149-160. IEEE Computer Society, Los Alamitos (2002)
-
(2002)
Computer Security Applications Conference
, pp. 149-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
12
-
-
0038341105
-
Silicon physical random functions
-
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security (ACM CCS), pp. 148-160 (2002)
-
(2002)
ACM Conference on Computer and Communications Security (ACM CCS)
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
13
-
-
4344587804
-
Identification and authentication of integrated circuits
-
Gassend, B., Lim, D., Clarke, D., van Dijk, M., Devadas, S.: Identification and authentication of integrated circuits. Concurrency and Computation: Practice and Experience 16(11), 1077-1098 (2004)
-
(2004)
Concurrency and Computation: Practice and Experience
, vol.16
, Issue.11
, pp. 1077-1098
-
-
Gassend, B.1
Lim, D.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
-
14
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
16
-
-
80053552465
-
-
April
-
Intrinsic ID: Product webpage (April 2011), http://www.intrinsic-id.com/ products.htm
-
(2011)
Product Webpage
-
-
-
17
-
-
33144457479
-
RFID security and privacy: A research survey
-
Juels, A.: RFID security and privacy: A research survey. Journal of Selected Areas in Communication 24(2), 381-395 (2006)
-
(2006)
Journal of Selected Areas in Communication
, vol.24
, Issue.2
, pp. 381-395
-
-
Juels, A.1
-
18
-
-
80053494509
-
-
(full version) June
-
Katzenbeisser, S., Ünal Kocabas, van der Leest, V., Sadeghi, A.R., Schrijen, G.J., Schröder, H., Wachsmann, C.: Recyclable PUFs: Logically reconfigurable PUFs (full version) (June 2011), http://www.trust.cased.de/
-
(2011)
Recyclable PUFs: Logically Reconfigurable PUFs
-
-
Katzenbeisser, S.1
Kocabas, Ü.2
Van Der Leest, V.3
Sadeghi, A.R.4
Schrijen, G.J.5
Schröder, H.6
Wachsmann, C.7
-
19
-
-
51849144293
-
The butterfly PUF protecting IP on every FPGA
-
Extended abstract
-
Kumar, S., Guajardo, J., Maes, R., Schrijen, G.J., Tuyls, P.: Extended abstract: The butterfly PUF protecting IP on every FPGA. In: IEEE Workshop on Hardware-Oriented Security and Trust (HOST), pp. 67-70 (2008)
-
(2008)
IEEE Workshop on Hardware-Oriented Security and Trust (HOST)
, pp. 67-70
-
-
Kumar, S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.J.4
Tuyls, P.5
-
20
-
-
70449096107
-
Reconfigurable physical unclonable functions - Enabling technology for tamper-resistant storage
-
IEEE Computer Society, San Francisco
-
Kursawe, K., Sadeghi, A.R., Schellekens, D., Tuyls, P., Scoric, B.: Reconfigurable physical unclonable functions - Enabling technology for tamper-resistant storage. In: IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), pp. 22-29. IEEE Computer Society, San Francisco (2009)
-
(2009)
IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)
, pp. 22-29
-
-
Kursawe, K.1
Sadeghi, A.R.2
Schellekens, D.3
Tuyls, P.4
Scoric, B.5
-
21
-
-
84985820553
-
Hash functions based on block ciphers
-
Rueppel, R.A. (ed.) EUROCRYPT 1992. Springer, Heidelberg
-
Lai, X., Massey, J.: Hash functions based on block ciphers. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 55-70. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.658
, pp. 55-70
-
-
Lai, X.1
Massey, J.2
-
23
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication application
-
Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication application. In: Symposium on VLSI Circuits, pp. 176-179 (2004)
-
(2004)
Symposium on VLSI Circuits
, pp. 176-179
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
24
-
-
78650185683
-
Hardware intrinsic security from D flip-flops
-
van der Leest, V., Schrijen, G.J., Handschuh, H., Tuyls, P.: Hardware intrinsic security from D flip-flops. In: ACM Workshop on Scalable Trusted Computing (ACM STC), pp. 53-62 (2010)
-
(2010)
ACM Workshop on Scalable Trusted Computing (ACM STC)
, pp. 53-62
-
-
Van Der Leest, V.1
Schrijen, G.J.2
Handschuh, H.3
Tuyls, P.4
-
26
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Lim, D., Lee, J.W., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Transactions on VLSI Systems 13(10), 1200-1205 (2005)
-
(2005)
IEEE Transactions on VLSI Systems
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
27
-
-
77957943386
-
Low-power sub-threshold design of secure physical unclonable functions
-
Lin, L., Holcomb, D., Krishnappa, D.K., Shabadi, P., Burleson, W.: Low-power sub-threshold design of secure physical unclonable functions. In: ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED), pp. 43-48 (2010)
-
(2010)
ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED)
, pp. 43-48
-
-
Lin, L.1
Holcomb, D.2
Krishnappa, D.K.3
Shabadi, P.4
Burleson, W.5
-
28
-
-
77949345944
-
Intrinsic PUFs from flip-flops on reconfigurable devices
-
Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic PUFs from flip-flops on reconfigurable devices. In: Workshop on Information and System Security (WISSec), p. 17 (2008)
-
(2008)
Workshop on Information and System Security (WISSec)
, pp. 17
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
29
-
-
85016215043
-
Physically unclonable functions: A study on the state of the art and future research directions
-
Sadeghi, A.R., Naccache, D. (eds.) Springer, Heidelberg
-
Maes, R., Verbauwhede, I.: Physically unclonable functions: A study on the state of the art and future research directions. In: Sadeghi, A.R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security. Information Security and Cryptography, pp. 3-37. Springer, Heidelberg (2010)
-
(2010)
Towards Hardware-Intrinsic Security. Information Security and Cryptography
, pp. 3-37
-
-
Maes, R.1
Verbauwhede, I.2
-
30
-
-
77955766025
-
A large scale characterization of RO-PUF
-
Maiti, A., Casarona, J., McHale, L., Schaumont, P.: A large scale characterization of RO-PUF. In: IEEE Symposium on Hardware-Oriented Security and Trust (HOST), pp. 94-99 (2010)
-
(2010)
IEEE Symposium on Hardware-Oriented Security and Trust (HOST)
, pp. 94-99
-
-
Maiti, A.1
Casarona, J.2
McHale, L.3
Schaumont, P.4
-
31
-
-
33747614000
-
Designing resistant circuits against malicious faults injection using asynchronous logic
-
Monnet, Y., Renaudin, M., Leveugle, R.: Designing resistant circuits against malicious faults injection using asynchronous logic. IEEE Trans. Comput. 55, 1104-1115 (2006), http://dx.doi.org/10.1109/TC.2006.143
-
(2006)
IEEE Trans. Comput.
, vol.55
, pp. 1104-1115
-
-
Monnet, Y.1
Renaudin, M.2
Leveugle, R.3
-
36
-
-
80053496243
-
-
April
-
OV-Chipkaart: Website (April 2011), http://www.ov-chipkaart.nl/
-
(2011)
OV-Chipkaart: Website
-
-
-
37
-
-
49149115221
-
Towards robust low cost authentication for pervasive devices
-
IEEE Computer Society, Los Alamitos
-
Öztürk, E., Hammouri, G., Sunar, B.: Towards robust low cost authentication for pervasive devices. In: IEEE International Conference on Pervasive Computing and Communications (PERCOM 2008). IEEE Computer Society, Los Alamitos (2008)
-
(2008)
IEEE International Conference on Pervasive Computing and Communications (PERCOM 2008)
-
-
Öztürk, E.1
Hammouri, G.2
Sunar, B.3
-
38
-
-
3242749566
-
-
Ph.D. thesis, Massachusetts Institute of Technology March
-
Pappu, R.S.: Physical one-way functions. Ph.D. thesis, Massachusetts Institute of Technology (March 2001)
-
(2001)
Physical One-way Functions
-
-
Pappu, R.S.1
-
39
-
-
0037144430
-
Physical one-way functions
-
Pappu, R.S., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297, 2026-2030 (2002)
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.S.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
41
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: ACM conference on Computer and communications security (ACM CCS), pp. 237-249 (2010)
-
(2010)
ACM Conference on Computer and Communications Security (ACM CCS)
, pp. 237-249
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
42
-
-
78650619858
-
PUF-enhanced RFID security and privacy
-
Sadeghi, A.R., Visconti, I., Wachsmann, C.: PUF-enhanced RFID security and privacy. In: Workshop on Secure Component and System Identification, SECSI (2010)
-
Workshop on Secure Component and System Identification, SECSI (2010)
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
43
-
-
70349143010
-
-
March
-
Schreur, R.W., van Rossum, P., Garcia, F., Teepe, W., Hoepman, J.H., Jacobs, B., De Koning Gans, G., Verdult, R., Muijrers, R., Kali, R., Kali, V.: Security flaw in MiFare Classic (March 2008), http://www.sos.cs.ru.nl/ applications/rfid/pressrelease.en.html
-
(2008)
Security Flaw in MiFare Classic
-
-
Schreur, R.W.1
Van Rossum, P.2
Garcia, F.3
Teepe, W.4
Hoepman, J.H.5
Jacobs, B.6
De Koning Gans, G.7
Verdult, R.8
Muijrers, R.9
Kali, R.10
Kali, V.11
-
44
-
-
27244445173
-
-
Technical Report UCAM-CL-TR-630, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB03 0FD, UK April
-
Skorobogatov, S.: Semi-invasive attacks - A new approach to hardware security analysis. Technical Report UCAM-CL-TR-630, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB03 0FD, UK (April 2005)
-
(2005)
Semi-invasive Attacks - A New Approach to Hardware Security Analysis
-
-
Skorobogatov, S.1
-
47
-
-
34548818732
-
A 1.6pJ/bit 96% stable chip-ID generating circuit using process variations
-
Su, Y., Holleman, J., Otis, B.: A 1.6pJ/bit 96% stable chip-ID generating circuit using process variations. In: IEEE International Solid-State Circuits Conference (ISSCC), pp. 406-611 (2007)
-
(2007)
IEEE International Solid-State Circuits Conference (ISSCC)
, pp. 406-611
-
-
Su, Y.1
Holleman, J.2
Otis, B.3
-
48
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference, pp. 9-14 (2007)
-
(2007)
Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
49
-
-
33745654539
-
RFID-tags for anti-counterfeiting
-
Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
-
Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115-131. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
50
-
-
33750726983
-
Read-proof hardware from protective coatings
-
Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
-
Tuyls, P., Schrijen, G.-J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-proof hardware from protective coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.-J.2
Škorić, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
51
-
-
80053552465
-
-
April
-
Verayo, Inc.: Product webpage (April 2011), http://www.verayo.com/ product/products.html
-
(2011)
Product Webpage
-
-
-
52
-
-
26444544536
-
Robust key extraction from physical uncloneable functions
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
Škorić, B., Tuyls, P., Ophey, W.: Robust key extraction from physical uncloneable functions. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407-422. Springer, Heidelberg (2005) (Pubitemid 41422130)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 407-422
-
-
Skoric, B.1
Tuyls, P.2
Ophey, W.3
-
53
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. Springer, Heidelberg
-
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 50-59. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2802
, pp. 50-59
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
54
-
-
80053517266
-
-
Wikipedia: OV-Chipkaart, http://en.wikipedia.org/wiki/OV-chipkaart
-
OV-Chipkaart
-
-
|