메뉴 건너뛰기




Volumn E-95-A, Issue 1, 2012, Pages 223-233

Glitch PUF: Extracting information from usually unwanted glitches

Author keywords

Delay; Glitch; Physical unclonable function; PUF

Indexed keywords

COMPUTER SCIENCE; HARDWARE SECURITY;

EID: 84855303731     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1587/transfun.E95.A.223     Document Type: Conference Paper
Times cited : (27)

References (21)
  • 1
    • 78049343605 scopus 로고    scopus 로고
    • The glitch PUF: A new delay-PUF architecture exploiting glitch shapes
    • CHES 2010
    • D. Suzuki and K. Shimizu, "The glitch PUF: A new delay-PUF architecture exploiting glitch shapes," CHES 2010, LNCS 6225, pp.366-382, 2010.
    • (2010) LNCS , vol.6225 , pp. 366-382
    • Suzuki, D.1    Shimizu, K.2
  • 2
    • 3242749566 scopus 로고    scopus 로고
    • Ph.D. Thesis, M.I.T.
    • R.S. Pappu, Physical One-way Functions, Ph.D. Thesis, M.I.T., http://pubs.media.mit.edu/pubs/papers/01.03.pappuphd.powf.pdf, 2001.
    • (2001) Physical One-way Functions
    • Pappu, R.S.1
  • 3
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Eurocrypt 2004, Springer-Verlag
    • Y. Dodis, M. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," Eurocrypt 2004, LNCS 3027, pp.523-540, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, M.2    Smith, A.3
  • 5
    • 38049015807 scopus 로고    scopus 로고
    • FPGA intrinsic PUFs and their use for IP protection
    • CHES 2007, Springer-Verlag
    • J. Guajardo, S.S. Kumar, G.J.S̃chrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," CHES 2007, LNCS 4727, pp.63-80, Springer-Verlag, 2007.
    • (2007) LNCS , vol.4727 , pp. 63-80
    • Guajardo, J.1    Kumar, S.S.2    S̃chrijen, G.J.3    Tuyls, P.4
  • 6
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication applications
    • J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. van Dijk, and S. Devadas, "A technique to build a secret key in integrated circuits for identification and authentication applications," Proc. IEEE VLSI Circuits Symposium, pp.176-179, 2004.
    • (2004) Proc. IEEE VLSI Circuits Symposium , pp. 176-179
    • Lee, J.W.1    Lim, D.2    Gassend, B.3    Suh, G.E.4    Van Dijk, M.5    Devadas, S.6
  • 8
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
    • G.E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," Proc. 44th annual Design Automation Conference (DAC 2007), pp.9-14, 2007. (Pubitemid 47129916)
    • (2007) Proceedings - Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 11
    • 51049117293 scopus 로고    scopus 로고
    • Efficient helper data key extractor on FPGAs
    • Springer-Verlag CHES 2008
    • C. B̈osch, J. Guajardo, A.R. Sadeghi, J. Shokrollahi, and P. Tuyls, "Efficient helper data key extractor on FPGAs," CHES 2008, LNCS 5154, pp.181-197, Springer-Verlag, 2007.
    • (2007) LNCS , vol.5154 , pp. 181-197
    • B̈osch, C.1    Guajardo, J.2    Sadeghi, A.R.3    Shokrollahi, J.4    Tuyls, P.5
  • 13
    • 70350614531 scopus 로고    scopus 로고
    • A soft decision helper data algorithm for SRAM PUFs
    • CHES 2009
    • R. Maes, P. Tuyls, and I. Verbauwhede, "A soft decision helper data algorithm for SRAM PUFs," CHES 2009, LNCS 5747, pp.332-347, 2009.
    • (2009) LNCS , vol.5747 , pp. 332-347
    • Maes, R.1    Tuyls, P.2    Verbauwhede, I.3
  • 17
    • 85027203206 scopus 로고
    • Standard Delay Format Specification version 3.0
    • Standard Delay Format Specification version 3.0. http://www.eda.org/sdf/ sdf-3.0.pdf, 1995.
    • (1995)
  • 21
    • 38049049008 scopus 로고    scopus 로고
    • Estimating the secrecy-rate of physical unclonable functions with the context-tree weighting method
    • DOI 10.1109/ISIT.2006.261765, 4036011, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
    • T. Ignatenko, G.J. Schrijen, B. Skoric, P. Tuyls, and F. Willems, "Estimating the secrecy-rate of physical unclonable functions with the context-tree weighting method," Proc. 2006 IEEE International Symposium on Information Theory (ISIT 2006), pp.499-503, 2006. (Pubitemid 351244142)
    • (2006) IEEE International Symposium on Information Theory - Proceedings , pp. 499-503
    • Ignatenko, T.1    Schrijen, G.-J.2    Skoric, B.3    Tuyls, P.4    Willems, F.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.