메뉴 건너뛰기




Volumn , Issue , 2012, Pages 866-869

PUF-based secure test wrapper design for cryptographic SoC testing

Author keywords

Physically Unclonable Functions (PUF); Scan Chains; Secure Test Wrapper; SoC Testing

Indexed keywords

AUTHENTICATION; DIGITAL STORAGE; HARDWARE SECURITY; INTELLECTUAL PROPERTY CORE; PROGRAMMABLE LOGIC CONTROLLERS; SEMICONDUCTOR DEVICE MANUFACTURE; SYSTEM-ON-CHIP; TESTING;

EID: 84862090707     PISSN: 15301591     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/date.2012.6176618     Document Type: Conference Paper
Times cited : (36)

References (18)
  • 2
    • 84872354078 scopus 로고    scopus 로고
    • Robust key extraction from physical uncloneable functions applied cryptography and network security
    • B. Škorić, P. Tuyls, and W. Ophey, "Robust key extraction from physical uncloneable functions applied cryptography and network security," Applied Cryptography and Network Security (ACNS) 2005.
    • (2005) Applied Cryptography and Network Security (ACNS)
    • Škorić, B.1    Tuyls, P.2    Ophey, W.3
  • 6
    • 85016215043 scopus 로고    scopus 로고
    • Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions
    • D. Naccache, and A. Sadeghi (eds.), Springer
    • R. Maes, and I. Verbauwhede, "Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions," In Towards Hardware-Intrinsic Security, Security and Cryptology, D. Naccache, and A. Sadeghi (eds.), Springer, 2010.
    • (2010) Towards Hardware-Intrinsic Security, Security and Cryptology
    • Maes, R.1    Verbauwhede, I.2
  • 10
    • 17744381820 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and other noisy data
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and other noisy data," EUROCRYPT 2004.
    • EUROCRYPT 2004
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 11
    • 18144420462 scopus 로고    scopus 로고
    • Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard
    • B. Yang, K. Wu, and R. Karri, "Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard,"Proceedings of the IEEE Int. Test Conf. (ITC), 2004, pp. 339-344.
    • Proceedings of the IEEE Int. Test Conf. (ITC), 2004 , pp. 339-344
    • Yang, B.1    Wu, K.2    Karri, R.3
  • 15
    • 34548818140 scopus 로고    scopus 로고
    • Design for Secure Test - A Case Study on Pipelined Advanced Encryption Standard
    • Y. Shi, N. Togawa, M. Yanagisawa, and T. Ohtsuki, "Design for Secure Test - A Case Study on Pipelined Advanced Encryption Standard," ISCAS, 2007.
    • (2007) ISCAS
    • Shi, Y.1    Togawa, N.2    Yanagisawa, M.3    Ohtsuki, T.4
  • 18
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data,"SIAM J. Comput., vol. 38, no. 1, pp. 97-139, 2008.
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.