-
1
-
-
51049117293
-
Efficient helper data key extractor on fpgas
-
C. Bösch, J. Guajardo, A.-R. Sadeghi, J. Shokrollahi, and P. Tuyls. Efficient helper data key extractor on fpgas. In Proceedings of CHES, pages 181-197, 2008.
-
(2008)
Proceedings of CHES
, pp. 181-197
-
-
Bösch, C.1
Guajardo, J.2
Sadeghi, A.-R.3
Shokrollahi, J.4
Tuyls, P.5
-
2
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
March
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput., 38:97-139, March 2008.
-
(2008)
SIAM J. Comput.
, vol.38
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
3
-
-
0038341105
-
Silicon physical random functions
-
New York, NY, USA, ACM
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Silicon physical random functions. In Proceedings of the 9th ACM conference CCS'02, pages 148-160, New York, NY, USA, 2002. ACM.
-
(2002)
Proceedings of the 9th ACM Conference CCS'02
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
4
-
-
38049015807
-
Fpga intrinsic pufs and their use for ip protection
-
Berlin, Heidelberg, Springer-Verlag
-
J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls. Fpga intrinsic pufs and their use for ip protection. In Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, CHES '07, pages 63-80, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES '07
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
5
-
-
84927134124
-
Recyclable pufs: Logically recon gurable pufs
-
to appear
-
S. Katzenbeisser, U. Kocabas, V. van der Leest, A. Sadeghi, G. Schrijen, H. Schröder, and C. Wachsmann. Recyclable pufs: Logically recon gurable pufs. In Proceedings of CHES, to appear, 2011.
-
(2011)
Proceedings of CHES
-
-
Katzenbeisser, S.1
Kocabas, U.2
Van Der Leest, V.3
Sadeghi, A.4
Schrijen, G.5
Schröder, H.6
Wachsmann, C.7
-
6
-
-
51849144293
-
Extended abstract: The buttery puf protecting ip on every fpga
-
june
-
S. Kumar, J. Guajardo, R. Maes, G.-J. Schrijen, and P. Tuyls. Extended abstract: The buttery puf protecting ip on every fpga. In Proceedings of HOST 2008, pages 67-70, june 2008.
-
(2008)
Proceedings of HOST 2008
, pp. 67-70
-
-
Kumar, S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.-J.4
Tuyls, P.5
-
7
-
-
70449096107
-
Recon gurable physical unclonable functions - Enabling technology for tamper-resistant storage
-
Washington, DC, USA, IEEE Computer Society
-
K. Kursawe, A.-R. Sadeghi, D. Schellekens, B. Skoric, and P. Tuyls. Recon gurable physical unclonable functions - enabling technology for tamper-resistant storage. In Proceedings of HOST 2009, pages 22-29, Washington, DC, USA, 2009. IEEE Computer Society.
-
(2009)
Proceedings of HOST 2009
, pp. 22-29
-
-
Kursawe, K.1
Sadeghi, A.-R.2
Schellekens, D.3
Skoric, B.4
Tuyls, P.5
-
8
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
june
-
J. Lee, D. Lim, B. Gassend, G. Suh, M. van Dijk, and S. Devadas. A technique to build a secret key in integrated circuits for identification and authentication applications. In VLSI Circuits, 2004. Digest of Technical Papers. 2004 Symposium on, pages 176-179, june 2004.
-
(2004)
VLSI Circuits, 2004. Digest of Technical Papers. 2004 Symposium on
, pp. 176-179
-
-
Lee, J.1
Lim, D.2
Gassend, B.3
Suh, G.4
Van Dijk, M.5
Devadas, S.6
-
9
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
oct.
-
D. Lim, J. Lee, B. Gassend, G. Suh, M. van Dijk, and S. Devadas. Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 13(10):1200-1205, oct. 2005.
-
(2005)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.2
Gassend, B.3
Suh, G.4
Van Dijk, M.5
Devadas, S.6
-
10
-
-
77949345944
-
Intrinsic pufs from ip-ops on recon gurable devices
-
Eindhoven,NL
-
R. Maes, P. Tuyls, and I. Verbauwhede. Intrinsic pufs from ip-ops on recon gurable devices. In Workshop on Information and System Security (WISSec 2008), page 17, Eindhoven,NL, 2008.
-
(2008)
Workshop on Information and System Security (WISSec 2008)
, pp. 17
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
11
-
-
85016215043
-
Physically unclonable functions: A study on the state of the art and future research directions
-
D. Basin, U. Maurer, A.-R. Sadeghi, and D. Naccache, editors, Springer Berlin Heidelberg
-
R. Maes and I. Verbauwhede. Physically unclonable functions: A study on the state of the art and future research directions. In D. Basin, U. Maurer, A.-R. Sadeghi, and D. Naccache, editors, Towards Hardware-Intrinsic Security, Information Security and Cryptography, pages 3-37. Springer Berlin Heidelberg, 2010.
-
(2010)
Towards Hardware-Intrinsic Security, Information Security and Cryptography
, pp. 3-37
-
-
Maes, R.1
Verbauwhede, I.2
-
12
-
-
84943130890
-
A single poly eeprom cell structure for use in standard cmos processes
-
Mar.
-
K. Ohsaki, N. Asamoto, and S. Takagaki. A single poly eeprom cell structure for use in standard cmos processes. Solid-State Circuits, IEEE Journal of, 29(3):311-316, Mar. 1994.
-
(1994)
Solid-State Circuits, IEEE Journal of
, vol.29
, Issue.3
, pp. 311-316
-
-
Ohsaki, K.1
Asamoto, N.2
Takagaki, S.3
-
14
-
-
26444544536
-
Robust key extraction from physical uncloneable functions
-
J. Ioannidis, A. Keromytis, and M. Yung, editors, Applied Cryptography and Network Security, Springer Berlin / Heidelberg
-
B. Skoric, P. Tuyls, and W. Ophey. Robust key extraction from physical uncloneable functions. In J. Ioannidis, A. Keromytis, and M. Yung, editors, Applied Cryptography and Network Security, volume 3531 of Lecture Notes in Computer Science, pages 99-135. Springer Berlin / Heidelberg, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 99-135
-
-
Skoric, B.1
Tuyls, P.2
Ophey, W.3
|