-
1
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput., 38(1):97-139, 2008.
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
2
-
-
0038341105
-
Silicon physical random functions
-
New York, NY, USA ACM
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Silicon physical random functions. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, pages 148-160, New York, NY, USA, 2002. ACM.
-
(2002)
CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
3
-
-
38049015807
-
Fpga intrinsic pufs and their use for ip protection
-
P. Paillier and I. Verbauwhede, editors Springer
-
J. Guajardo, S. S. Kumar, G. J. Schrijen, and P. Tuyls. Fpga intrinsic pufs and their use for ip protection. In P. Paillier and I. Verbauwhede, editors, CHES, volume 4727 of Lecture Notes in Computer Science, pages 63-80. Springer, 2007.
-
(2007)
CHES, Volume 4727 of Lecture Notes in Computer Science
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
4
-
-
51849144293
-
Extended abstract: The butterfly puf protecting ip on every fpga
-
June
-
S. S. Kumar, J. Guajardo, R. Maes, G. J. Schrijen, and P. Tuyls. Extended abstract: The butterfly puf protecting ip on every fpga. Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), pages 67-70, June 2008.
-
(2008)
Hardware-oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on Hardware-oriented Security and Trust (HOST)
, pp. 67-70
-
-
Kumar, S.S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.J.4
Tuyls, P.5
-
5
-
-
77949345944
-
Intrinsic pufs from flip-flops on reconfigurable devices
-
Eindhoven, NL
-
R. Maes, P. Tuyls, and I. Verbauwhede. Intrinsic pufs from flip-flops on reconfigurable devices. In 3rd Benelux Workshop on Information and System Security (WISSec 2008), page 17, Eindhoven, NL, 2008.
-
(2008)
3rd Benelux Workshop on Information and System Security (WISSec 2008)
, pp. 17
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
6
-
-
77955766025
-
A large scal characterization of ro-puf
-
A. Maiti, J. Casarona, L. McHale, and P. Schaumont. A large scal characterization of ro-puf. In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pages 66-71, 2010.
-
(2010)
IEEE International Symposium on Hardware-oriented Security and Trust (HOST)
, pp. 66-71
-
-
Maiti, A.1
Casarona, J.2
McHale, L.3
Schaumont, P.4
-
8
-
-
85037371734
-
Side-channel analysis of pufs and fuzzy extractors
-
Pittsburgh, PA, USA, June Springer
-
D. Merli, D. Schuster, F. Stumpf, and G. Sigl. Side-channel analysis of pufs and fuzzy extractors. In 4th International Conference on Trust and Trustworthy Computing (TRUST2011), Pittsburgh, PA, USA, June 2011. Springer.
-
(2011)
4th International Conference on Trust and Trustworthy Computing (TRUST2011)
-
-
Merli, D.1
Schuster, D.2
Stumpf, F.3
Sigl, G.4
-
9
-
-
78650100278
-
Improving the quality of ring oscillator pufs on fpgas
-
Scottsdale, AZ, USA, October ACM
-
D. Merli, F. Stumpf, and C. Eckert. Improving the quality of ring oscillator pufs on fpgas. In 5th Workshop on Embedded Systems Security (WESS'2010), Scottsdale, AZ, USA, October 2010. ACM.
-
(2010)
5th Workshop on Embedded Systems Security (WESS'2010)
-
-
Merli, D.1
Stumpf, F.2
Eckert, C.3
-
11
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
New York, NY, USA ACM
-
U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, and J. Schmidhuber. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 237-249, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 237-249
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
12
-
-
70349408011
-
Electromagnetic radiations of fpgas: High spatial resolution cartography and attack on a cryptographic module
-
March
-
L. Sauvage, S. Guilley, and Y. Mathieu. Electromagnetic radiations of fpgas: High spatial resolution cartography and attack on a cryptographic module. ACM Trans. Reconfigurable Technol. Syst., 2:4:1-4:24, March 2009.
-
(2009)
ACM Trans. Reconfigurable Technol. Syst.
, vol.2
, pp. 41-424
-
-
Sauvage, L.1
Guilley, S.2
Mathieu, Y.3
-
14
-
-
77958084948
-
Optical fault masking attacks
-
L. Breveglieri, M. Joye, I. Koren, D. Naccache, and I. Verbauwhede, editors IEEE Computer Society
-
S. Skorobogatov. Optical fault masking attacks. In L. Breveglieri, M. Joye, I. Koren, D. Naccache, and I. Verbauwhede, editors, FDTC, pages 23-29. IEEE Computer Society, 2010.
-
(2010)
FDTC
, pp. 23-29
-
-
Skorobogatov, S.1
-
15
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
-
G. E. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. Design Automation Conference, 2007. DAC '07. 44th ACM/IEEE, pages 9-14, 2007. (Pubitemid 47129916)
-
(2007)
Proceedings - Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
16
-
-
33750726983
-
Read-proof hardware from protective coatings
-
Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings
-
P. Tuyls, G.-J. Schrijen, B. Škorić, J. van Geloven, N. Verhaegh, and R. Wolters. Read-proof hardware from protective coatings. In L. Goubin and M. Matsui, editors, Cryptographic Hardware and Embedded Systems - CHES 2006, volume 4249 of Lecture Notes in Computer Science, chapter 29, pages 369-383. Springer Berlin Heidelberg, 2006. (Pubitemid 44700070)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.-J.2
Skoric, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
|