-
1
-
-
78049343605
-
The glitch PUF: A new delay-PUF architecture exploiting glitch shapes
-
CHES 2010
-
D. Suzuki and K. Shimizu, "The glitch PUF: A new delay-PUF architecture exploiting glitch shapes," CHES 2010, LNCS 6225, pp.366-382, 2010.
-
(2010)
LNCS
, vol.6225
, pp. 366-382
-
-
Suzuki, D.1
Shimizu, K.2
-
2
-
-
3242749566
-
-
Ph.D. Thesis, M.I.T.
-
R.S. Pappu, Physical One-way Functions, Ph.D. Thesis, M.I.T., http://pubs.media.mit.edu/pubs/papers/01.03.pappuphd.powf.pdf, 2001.
-
(2001)
Physical One-way Functions
-
-
Pappu, R.S.1
-
3
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Eurocrypt 2004, Springer-Verlag
-
Y. Dodis, M. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," Eurocrypt 2004, LNCS 3027, pp.523-540, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, M.2
Smith, A.3
-
4
-
-
0038341105
-
Silicon physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon physical random functions," Proc. 9th ACM Conference on Computer and Communications Security (CCS 2002), pp.148-160, 2002.
-
(2002)
Proc. 9th ACM Conference on Computer and Communications Security (CCS 2002)
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
5
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
CHES 2007, Springer-Verlag
-
J. Guajardo, S.S. Kumar, G.J.S̃chrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," CHES 2007, LNCS 4727, pp.63-80, Springer-Verlag, 2007.
-
(2007)
LNCS
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
S̃chrijen, G.J.3
Tuyls, P.4
-
6
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. van Dijk, and S. Devadas, "A technique to build a secret key in integrated circuits for identification and authentication applications," Proc. IEEE VLSI Circuits Symposium, pp.176-179, 2004.
-
(2004)
Proc. IEEE VLSI Circuits Symposium
, pp. 176-179
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
8
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
-
G.E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," Proc. 44th annual Design Automation Conference (DAC 2007), pp.9-14, 2007. (Pubitemid 47129916)
-
(2007)
Proceedings - Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
9
-
-
51849144293
-
Extended abstract: The butterfly PUF: Protecting IP on every FPGA
-
S.S. Kumar, J. Guajardo, R. Maes, G.J. S̃chrijen, and P. Tuyls, "Extended abstract: The butterfly PUF: Protecting IP on every FPGA," Proc. IEEE International Workshop on Hardware-Oriented Security and Trust 2008 (HOST 2008), pp.67-70, 2008.
-
(2008)
Proc. IEEE International Workshop on Hardware-Oriented Security and Trust 2008 (HOST 2008)
, pp. 67-70
-
-
Kumar, S.S.1
Guajardo, J.2
Maes, R.3
S̃chrijen, G.J.4
Tuyls, P.5
-
10
-
-
57849102046
-
Lightweight secure PUFs
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Lightweight secure PUFs," Proc. IEEE/ACM International Conference on Computer-Aided Design (ICCAD 2008), pp.670-673, 2008.
-
(2008)
Proc. IEEE/ACM International Conference on Computer-Aided Design (ICCAD 2008)
, pp. 670-673
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
11
-
-
51049117293
-
Efficient helper data key extractor on FPGAs
-
Springer-Verlag CHES 2008
-
C. B̈osch, J. Guajardo, A.R. Sadeghi, J. Shokrollahi, and P. Tuyls, "Efficient helper data key extractor on FPGAs," CHES 2008, LNCS 5154, pp.181-197, Springer-Verlag, 2007.
-
(2007)
LNCS
, vol.5154
, pp. 181-197
-
-
B̈osch, C.1
Guajardo, J.2
Sadeghi, A.R.3
Shokrollahi, J.4
Tuyls, P.5
-
12
-
-
70449487684
-
Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs
-
R. Maes, P. Tuyls, and I. Verbauwhede, "Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs," Proc. 2009 IEEE International Symposium on Information Theory (ISIT 2009), pp.2101-2105, 2009.
-
(2009)
Proc. 2009 IEEE International Symposium on Information Theory (ISIT 2009)
, pp. 2101-2105
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
13
-
-
70350614531
-
A soft decision helper data algorithm for SRAM PUFs
-
CHES 2009
-
R. Maes, P. Tuyls, and I. Verbauwhede, "A soft decision helper data algorithm for SRAM PUFs," CHES 2009, LNCS 5747, pp.332-347, 2009.
-
(2009)
LNCS
, vol.5747
, pp. 332-347
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
16
-
-
76949086041
-
On the foundations of physical unclonable functions
-
2009
-
U. Rührmair, J. Sölter, and F. Sehnke, "On the foundations of physical unclonable functions," Cryptology ePrint Archive, 2009/277, 2009.
-
(2009)
Cryptology Eprint Archive
, vol.277
-
-
Rührmair, U.1
Sölter, J.2
Sehnke, F.3
-
17
-
-
85027203206
-
-
Standard Delay Format Specification version 3.0
-
Standard Delay Format Specification version 3.0. http://www.eda.org/sdf/ sdf-3.0.pdf, 1995.
-
(1995)
-
-
-
18
-
-
77955766025
-
A large scale characterization of RO-PUF
-
A. Maiti, J. Casarona, L. McHale, and P. Schaumont, "A large scale characterization of RO-PUF," Proc. 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), pp.94-99, 2010.
-
(2010)
Proc. 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010)
, pp. 94-99
-
-
Maiti, A.1
Casarona, J.2
McHale, L.3
Schaumont, P.4
-
20
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, and J. Schmidhuber, "Modeling attacks on physical unclonable functions," Proc. 17th ACM Conference on Computer and Communications Security (CCS 2010), pp.237-249, 2010.
-
(2010)
Proc. 17th ACM Conference on Computer and Communications Security (CCS 2010)
, pp. 237-249
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
21
-
-
38049049008
-
Estimating the secrecy-rate of physical unclonable functions with the context-tree weighting method
-
DOI 10.1109/ISIT.2006.261765, 4036011, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
T. Ignatenko, G.J. Schrijen, B. Skoric, P. Tuyls, and F. Willems, "Estimating the secrecy-rate of physical unclonable functions with the context-tree weighting method," Proc. 2006 IEEE International Symposium on Information Theory (ISIT 2006), pp.499-503, 2006. (Pubitemid 351244142)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 499-503
-
-
Ignatenko, T.1
Schrijen, G.-J.2
Skoric, B.3
Tuyls, P.4
Willems, F.5
|