메뉴 건너뛰기




Volumn , Issue , 2011, Pages 59-64

Logically reconfigurable PUFs: Memory-based secure key storage

Author keywords

physically unclonable functions

Indexed keywords

HARDWARE SECURITY; KEY STORAGE; NON-VOLATILE MEMORIES; PHYSICALLY UNCLONABLE FUNCTIONS; RE-CONFIGURABLE; STATE INFORMATION;

EID: 80755167790     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046582.2046594     Document Type: Conference Paper
Times cited : (40)

References (14)
  • 2
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • March
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput., 38:97-139, March 2008.
    • (2008) SIAM J. Comput. , vol.38 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 7
    • 70449096107 scopus 로고    scopus 로고
    • Recon gurable physical unclonable functions - Enabling technology for tamper-resistant storage
    • Washington, DC, USA, IEEE Computer Society
    • K. Kursawe, A.-R. Sadeghi, D. Schellekens, B. Skoric, and P. Tuyls. Recon gurable physical unclonable functions - enabling technology for tamper-resistant storage. In Proceedings of HOST 2009, pages 22-29, Washington, DC, USA, 2009. IEEE Computer Society.
    • (2009) Proceedings of HOST 2009 , pp. 22-29
    • Kursawe, K.1    Sadeghi, A.-R.2    Schellekens, D.3    Skoric, B.4    Tuyls, P.5
  • 11
    • 85016215043 scopus 로고    scopus 로고
    • Physically unclonable functions: A study on the state of the art and future research directions
    • D. Basin, U. Maurer, A.-R. Sadeghi, and D. Naccache, editors, Springer Berlin Heidelberg
    • R. Maes and I. Verbauwhede. Physically unclonable functions: A study on the state of the art and future research directions. In D. Basin, U. Maurer, A.-R. Sadeghi, and D. Naccache, editors, Towards Hardware-Intrinsic Security, Information Security and Cryptography, pages 3-37. Springer Berlin Heidelberg, 2010.
    • (2010) Towards Hardware-Intrinsic Security, Information Security and Cryptography , pp. 3-37
    • Maes, R.1    Verbauwhede, I.2
  • 12
    • 84943130890 scopus 로고
    • A single poly eeprom cell structure for use in standard cmos processes
    • Mar.
    • K. Ohsaki, N. Asamoto, and S. Takagaki. A single poly eeprom cell structure for use in standard cmos processes. Solid-State Circuits, IEEE Journal of, 29(3):311-316, Mar. 1994.
    • (1994) Solid-State Circuits, IEEE Journal of , vol.29 , Issue.3 , pp. 311-316
    • Ohsaki, K.1    Asamoto, N.2    Takagaki, S.3
  • 14
    • 26444544536 scopus 로고    scopus 로고
    • Robust key extraction from physical uncloneable functions
    • J. Ioannidis, A. Keromytis, and M. Yung, editors, Applied Cryptography and Network Security, Springer Berlin / Heidelberg
    • B. Skoric, P. Tuyls, and W. Ophey. Robust key extraction from physical uncloneable functions. In J. Ioannidis, A. Keromytis, and M. Yung, editors, Applied Cryptography and Network Security, volume 3531 of Lecture Notes in Computer Science, pages 99-135. Springer Berlin / Heidelberg, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 99-135
    • Skoric, B.1    Tuyls, P.2    Ophey, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.