-
3
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Oct.
-
D. Lim, J. W. Lee, B. Gassend, E. G. Suh, M. van Dijk, and S. Devadas, "Extracting secret keys from integrated circuits," IEEE Transactions on Very Large Scale Integration (TVLSI), vol. 13, no. 10, pp.1200-1205, Oct. 2005.
-
(2005)
IEEE Transactions on Very Large Scale Integration (TVLSI)
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, E.G.4
Van Dijk, M.5
Devadas, S.6
-
6
-
-
85016215043
-
Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions
-
D. Naccache, and A. Sadeghi (eds.), Springer
-
R. Maes, and I. Verbauwhede, "Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions," In Towards Hardware-Intrinsic Security, Security and Cryptology, D. Naccache, and A. Sadeghi (eds.), Springer, 2010.
-
(2010)
Towards Hardware-Intrinsic Security, Security and Cryptology
-
-
Maes, R.1
Verbauwhede, I.2
-
8
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, and J. Schmidhuber, "Modeling attacks on physical unclonable functions," ACM Conference on Computer and Communications Security (ACM CCS) 2010.
-
ACM Conference on Computer and Communications Security (ACM CCS) 2010
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
9
-
-
46449138830
-
Controlled physical random functions
-
IEEE
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Controlled physical random functions," Computer Security Applications Conference (ACSAC). IEEE, 2002, pp. 149-160.
-
(2002)
Computer Security Applications Conference (ACSAC)
, pp. 149-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
10
-
-
17744381820
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and other noisy data," EUROCRYPT 2004.
-
EUROCRYPT 2004
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
11
-
-
18144420462
-
Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard
-
B. Yang, K. Wu, and R. Karri, "Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard,"Proceedings of the IEEE Int. Test Conf. (ITC), 2004, pp. 339-344.
-
Proceedings of the IEEE Int. Test Conf. (ITC), 2004
, pp. 339-344
-
-
Yang, B.1
Wu, K.2
Karri, R.3
-
13
-
-
10444228875
-
Scan Design and Secure Chip
-
D. Hély, M.-L. Flottes, F. Bancel, and B. Rouzeyre, "Scan Design and Secure Chip," International On-Line Testing Symposium (IOLTS), 2004.
-
International On-Line Testing Symposium (IOLTS), 2004
-
-
Hély, D.1
Flottes, M.-L.2
Bancel, F.3
Rouzeyre, B.4
-
14
-
-
36248952114
-
Securing Designs against Scan-Based Side-Channel Attacks
-
J. Lee, M. Tehranipoor, C. Patel, and J. Plusquellice, "Securing Designs against Scan-Based Side-Channel Attacks," Transactions on Dependable and Secure Computing, Vol. 4, No. 4, 2007.
-
(2007)
Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
-
-
Lee, J.1
Tehranipoor, M.2
Patel, C.3
Plusquellice, J.4
-
15
-
-
34548818140
-
Design for Secure Test - A Case Study on Pipelined Advanced Encryption Standard
-
Y. Shi, N. Togawa, M. Yanagisawa, and T. Ohtsuki, "Design for Secure Test - A Case Study on Pipelined Advanced Encryption Standard," ISCAS, 2007.
-
(2007)
ISCAS
-
-
Shi, Y.1
Togawa, N.2
Yanagisawa, M.3
Ohtsuki, T.4
-
16
-
-
33744480311
-
Test Control for Secure Scan Designs
-
D. Hély, F. Bancel, M.-L. Flottes, and B. Rouzeyre, "Test Control for Secure Scan Designs," European Test Symposium (ETS), 2005.
-
European Test Symposium (ETS), 2005
-
-
Hély, D.1
Bancel, F.2
Flottes, M.-L.3
Rouzeyre, B.4
-
18
-
-
52149117439
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data,"SIAM J. Comput., vol. 38, no. 1, pp. 97-139, 2008.
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
|