-
2
-
-
84860705878
-
PUF ROKs: Generating read-once keys from physically unclonable functions (extended abstract)
-
April 21-23, Oak Ridge, Tennessee, USA
-
Michael S. Kirkpatrick, Elisa Bertino, Sam Kerr.: PUF ROKs: Generating Read-Once Keys from Physically Unclonable Functions (Extended Abstract). In: CSIIRW'10, April 21-23, Oak Ridge, Tennessee, USA.
-
CSIIRW'10
-
-
Kirkpatrick, M.S.1
Bertino, E.2
Kerr, S.3
-
4
-
-
77749299135
-
NLM-128, An improved LM-type summation generator with 2-bit memories
-
Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim: NLM-128, An Improved LM-type Summation Generator with 2-bit memories. In: ICCIT'09, pp. 577-582.
-
ICCIT'09
, pp. 577-582
-
-
Lee, H.J.1
Sung, S.M.2
Kim, H.R.3
-
6
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SLAVM J. Comput., 38(1):97-139, 2008
-
(2008)
SLAVM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
8
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
New York, NY, USA, ACM
-
th annual Design Automation Conference, pages 9-14, New York, NY, USA, 2007. ACM
-
(2007)
th Annual Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
9
-
-
33745654539
-
RFID-tags for anti-counterfeiting
-
volume 3860 of LNCS
-
Pim Tuyls, Lejla Batina.: RFID-Tags for Anti-Counterfeiting. In Topics in Cryptology- CT-RSA 2006, volume 3860 of LNCS, pages 115-131, 2006.
-
(2006)
Topics in Cryptology- CT-RSA 2006
, pp. 115-131
-
-
Tuyls, P.1
Lejla, B.2
-
12
-
-
49049105769
-
Design and implementation of puf-based "unclonable" RFID ICs for anti-counterfeiting and security applications
-
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola and V. Khandelwal. Design and Implementation of PUF-based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications. In RFID, 2008 IEEE International Conference, pages 58-64, 2008
-
(2008)
RFID, 2008 IEEE International Conference
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
14
-
-
34547623904
-
Physically unclonable function-based security and privacy in RFID system
-
Washington, DC, USA, IEEE Computer Society
-
L. Bolotnyy and G. Robins. Physically unclonable function-based security and privacy in RFID system. In Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications, pages 211-220, Washington, DC, USA, 2007, IEEE Computer Society.
-
(2007)
Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
, pp. 211-220
-
-
Bolotnyy, L.1
Robins, G.2
-
15
-
-
78650619858
-
PUF-enhanced RFID security and privacy
-
Cologne, Germany, April
-
A. R. Sadeghi, I. Visconti, and C. Wachsmann. PUF-Enhanced RFID Security and Privacy. In Secure Component and System Identification -SECSI'10, Cologne, Germany, April 2010.
-
(2010)
Secure Component and System Identification -SECSI'10
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
16
-
-
38149038702
-
On privacy models for RFID
-
Berlin, Heidelberg, Springer-Verlag
-
th international conference on Theory and application of cryptology and information security, ASIACRYPT'07, pages 68-87, Berlin, Heidelberg, 2007, Springer-Verlag.
-
(2007)
th International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT'07
, pp. 68-87
-
-
Vaudenay, S.1
-
17
-
-
84860758754
-
An RFID authentication protocol based symmetric key using hashed tag ID
-
Dec.
-
Yong Soo Park, et al.: An RFID Authentication Protocol based symmetric key Using Hashed Tag ID: The Korea Information Processing Society: Vol.16-C, No.6: Dec. 2009.
-
(2009)
The Korea Information Processing Society
, vol.16-C
, Issue.6
-
-
Park, Y.S.1
-
18
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification system
-
Stepan A. Weis, et al.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification System: Security in Prevasive Computing-SPC 2003: LNCS 2802: pp.201-212: (2004)
-
(2004)
Security in Prevasive Computing-SPC 2003: LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
-
20
-
-
57049150751
-
A study on secure RFID mutual authentication scheme in pervasive computing environment
-
S. Kang, D. Lee, and I. Lee.: A study on secure RFID mutual authentication scheme in pervasive computing environment: Computer Communications 31: pp.4248-4254: (2008)
-
(2008)
Computer Communications
, vol.31
, pp. 4248-4254
-
-
Kang, S.1
Lee, D.2
Lee, I.3
-
23
-
-
0001120657
-
Fast correlation attacks on the summation generator
-
J. Golic, and M. Salmasizadeh and E. Dawson, Fast Correlation Attacks on the Summation Generator," Journal of Cryptology, Vol. 13, No. 2, pp.245-262, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.2
, pp. 245-262
-
-
Golic, J.1
Salmasizadeh, M.2
Dawson, E.3
-
24
-
-
0343167987
-
On an improved summation generator with 2-bit memory
-
Jan.
-
Hoonjae Lee, Sangjae Moon, "On An Improved Summation Generator with 2-Bit Memory," Signal Processing, 80(1), pp. 211217, Jan. 2000.
-
(2000)
Signal Processing
, vol.80
, Issue.1
, pp. 211217
-
-
Lee, H.1
Moon, S.2
-
26
-
-
0032639401
-
An efficient inplementation of the D-homomorphism for generation of de bruijn sequences
-
T. Chang, B. Park, Y. H. Kim, "An Efficient Inplementation of the D-Homomorphism for Generation of de Bruijn Sequences", IEEE Transactions on Information Theory, 45, 4, 1280-1283, 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.4
, pp. 1280-1283
-
-
Chang, T.1
Park, B.2
Kim, Y.H.3
-
27
-
-
81055148134
-
RFID mutual authentication protocol with unclonable RFID-tags
-
Gumi, Korea
-
Young Sil Lee, YoungMi Park, SangHan Lee, TaeYong Kim, Hoon Jae Lee, RFID Mutual Authentication Protocol with Unclonable RFID-tags, IEEE international conference on Mobile IT Convergence, Gumi, Korea, 2011.
-
(2011)
IEEE International Conference on Mobile IT Convergence
-
-
Lee, Y.S.1
Park, Y.M.2
Lee, S.H.3
Kim, T.Y.4
Lee, H.J.5
|