-
1
-
-
72449124251
-
Memory Leakage- Resilient Encryption Based on Physically Unclonable Functions
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., Tuyls, P.: Memory Leakage- Resilient Encryption Based on Physically Unclonable Functions. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 685-702. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 685-702
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.-R.3
Sunar, B.4
Tuyls, P.5
-
2
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
ACM
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS 1993, pp. 62-73. ACM (1993)
-
(1993)
ACM CCS 1993
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
51049117293
-
Efficient Helper Data Key Extractor on FPGAs
-
Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
-
Bösch, C., Guajardo, J., Sadeghi, A.-R., Shokrollahi, J., Tuyls, P.: Efficient Helper Data Key Extractor on FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 181-197. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5154
, pp. 181-197
-
-
Bösch, C.1
Guajardo, J.2
Sadeghi, A.-R.3
Shokrollahi, J.4
Tuyls, P.5
-
4
-
-
77649253940
-
On Physical Obfuscation of Cryptographic Algorithms
-
Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. Springer, Heidelberg
-
Bringer, J., Chabanne, H., Icart, T.: On Physical Obfuscation of Cryptographic Algorithms. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 88-103. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5922
, pp. 88-103
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
5
-
-
84862090707
-
PUF-based Secure Test Wrapper Design for Cryptographic SoC Testing
-
IEEE
-
Das, A., Kocabaş, Ü., Sadeghi, A.-R., Verbauwhede, I.: PUF-based Secure Test Wrapper Design for Cryptographic SoC Testing. In: Design, Automation and Test in Europe (DATE). IEEE (2012)
-
(2012)
Design, Automation and Test in Europe (DATE)
-
-
Das, A.1
Kocabaş, Ü.2
Sadeghi, A.-R.3
Verbauwhede, I.4
-
6
-
-
35048865463
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
7
-
-
80755167790
-
Logically reconfigurable PUFs: Memory-based secure key storage
-
ACM, New York
-
Eichhorn, I., Koeberl, P., van der Leest, V.: Logically reconfigurable PUFs: Memory-based secure key storage. In: ACM Workshop on Scalable Trusted Computing (ACM STC), pp. 59-64. ACM, New York (2011)
-
(2011)
ACM Workshop on Scalable Trusted Computing (ACM STC)
, pp. 59-64
-
-
Eichhorn, I.1
Koeberl, P.2
Van Der Leest, V.3
-
9
-
-
46449138830
-
Controlled physical random functions
-
IEEE
-
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled physical random functions. In: Computer Security Applications Conference (ACSAC), pp. 149-160. IEEE (2002)
-
(2002)
Computer Security Applications Conference (ACSAC)
, pp. 149-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
10
-
-
46449138830
-
Controlled physical random functions
-
IEEE
-
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled physical random functions. In: Computer Security Applications Conference (ACSAC), pp. 149-160. IEEE (2002)
-
(2002)
Computer Security Applications Conference (ACSAC)
, pp. 149-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
11
-
-
0038341105
-
Silicon physical random functions
-
ACM
-
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), pp. 148-160. ACM (2002)
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002)
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
12
-
-
0038341105
-
Silicon physical random functions
-
ACM, New York
-
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security (ACM CCS), pp. 148-160. ACM, New York (2002)
-
(2002)
ACM Conference on Computer and Communications Security (ACM CCS)
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
13
-
-
38049015807
-
FPGA Intrinsic PUFs and Their Use for IP Protection
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
14
-
-
51749089495
-
Brand and IP protection with physical unclonable functions
-
IEEE May
-
Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: Brand and IP protection with physical unclonable functions. In: IEEE International Symposium on Circuits and Systems (ISCAS) 2008, pp. 3186-3189. IEEE ( May 2008)
-
(2008)
IEEE International Symposium on Circuits and Systems (ISCAS) 2008
, pp. 3186-3189
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
15
-
-
50249134033
-
Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
-
Holcomb, D.E., Burleson, W.P., Fu, K.: Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Conference on RFID Security 2007, Malaga, Spain, July 11-13 (2007)
-
(2007)
Conference on RFID Security 2007, Malaga, Spain, July 11-13
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
16
-
-
51849144293
-
Extended abstract: The butterfly PUF protecting IP on every FPGA
-
IEEE June
-
Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.-J., Tuyls, P.: Extended abstract: The butterfly PUF protecting IP on every FPGA. In: Workshop on Hardware- Oriented Security (HOST), pp. 67-70. IEEE (June 2008)
-
(2008)
Workshop on Hardware- Oriented Security (HOST)
, pp. 67-70
-
-
Kumar, S.S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.-J.4
Tuyls, P.5
-
17
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
IEEE June
-
Lee, J.W., Lim, D., Gassend, B., Suh, E.G., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium on VLSI Circuits, pp. 176-179. IEEE (June 2004)
-
(2004)
Symposium on VLSI Circuits
, pp. 176-179
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, E.G.4
Van Dijk, M.5
Devadas, S.6
-
18
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Lim, D., Lee, J.W., Gassend, B., Suh, E.G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 13(10), 1200-1205 (2005)
-
(2005)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, E.G.4
Van Dijk, M.5
Devadas, S.6
-
19
-
-
77957943386
-
Low-power sub-threshold design of secure physical unclonable functions
-
IEEE August
-
Lin, L., Holcomb, D., Krishnappa, D.K., Shabadi, P., Burleson, W.: Low-power sub-threshold design of secure physical unclonable functions. In: International Symposium on Low-Power Electronics and Design (ISLPED), pp. 43-48. IEEE (August 2010)
-
(2010)
International Symposium on Low-Power Electronics and Design (ISLPED)
, pp. 43-48
-
-
Lin, L.1
Holcomb, D.2
Krishnappa, D.K.3
Shabadi, P.4
Burleson, W.5
-
21
-
-
85016215043
-
Physically unclonable functions: A study on the state of the art and future research directions
-
Maes, R., Verbauwhede, I.: Physically unclonable functions: A study on the state of the art and future research directions. In: Towards Hardware-Intrinsic Security (2010)
-
(2010)
Towards Hardware-Intrinsic Security
-
-
Maes, R.1
Verbauwhede, I.2
-
22
-
-
77955766025
-
A large scale characterization of RO-PUF
-
IEEE June
-
Maiti, A., Casarona, J., McHale, L., Schaumont, P.: A large scale characterization of RO-PUF. In: International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 94-99. IEEE (June 2010)
-
(2010)
International Symposium on Hardware-Oriented Security and Trust (HOST)
, pp. 94-99
-
-
Maiti, A.1
Casarona, J.2
McHale, L.3
Schaumont, P.4
-
23
-
-
49149115221
-
Towards robust low cost authentication for pervasive devices
-
IEEE, Washington, DC
-
Öztürk, E., Hammouri, G., Sunar, B.: Towards robust low cost authentication for pervasive devices. In: International Conference on Pervasive Computing and Communications (PerCom), pp. 170-178. IEEE, Washington, DC (2008)
-
(2008)
International Conference on Pervasive Computing and Communications (PerCom)
, pp. 170-178
-
-
Öztürk, E.1
Hammouri, G.2
Sunar, B.3
-
25
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
ACM, New York
-
Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: ACM Conference on Computer and Communications Security (ACM CCS), pp. 237-249. ACM, New York (2010)
-
(2010)
ACM Conference on Computer and Communications Security (ACM CCS)
, pp. 237-249
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
26
-
-
85019715933
-
Enhancing RFID security and privacy by physically unclonable functions
-
Springer, Heidelberg
-
Sadeghi, A.-R., Visconti, I., Wachsmann, C.: Enhancing RFID security and privacy by physically unclonable functions. In: Towards Hardware-Intrinsic Security. Information Security and Cryptography, pp. 281-305. Springer, Heidelberg (2010)
-
(2010)
Towards Hardware-Intrinsic Security. Information Security and Cryptography
, pp. 281-305
-
-
Sadeghi, A.-R.1
Visconti, I.2
Wachsmann, C.3
-
27
-
-
80051877491
-
Short paper: Lightweight remote attestation using physical functions
-
ACM, New York
-
Schulz, S., Sadeghi, A.-R., Wachsmann, C.: Short paper: Lightweight remote attestation using physical functions. In: Proceedings of the Fourth ACM Conference on Wireless Network Security (ACM WiSec), pp. 109-114. ACM, New York (2011)
-
(2011)
Proceedings of the Fourth ACM Conference on Wireless Network Security (ACM WiSec)
, pp. 109-114
-
-
Schulz, S.1
Sadeghi, A.-R.2
Wachsmann, C.3
-
28
-
-
85008008223
-
A digital 1.6 pJ/bit chip identification circuit using process variations
-
Su, Y., Holleman, J., Otis, B.P.: A digital 1.6 pJ/bit chip identification circuit using process variations. IEEE Journal of Solid-State Circuits 43(1), 69-77 (2008)
-
(2008)
IEEE Journal of Solid-State Circuits
, vol.43
, Issue.1
, pp. 69-77
-
-
Su, Y.1
Holleman, J.2
Otis, B.P.3
-
29
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
IEEE June
-
Suh, E.G., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: ACM/IEEE Design Automation Conference (DAC), pp. 9-14. IEEE (June 2007)
-
(2007)
ACM/IEEE Design Automation Conference (DAC)
, pp. 9-14
-
-
Suh, E.G.1
Devadas, S.2
-
30
-
-
33745654539
-
RFID-Tags for Anti-counterfeiting
-
Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
-
Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115-131. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
31
-
-
33750726983
-
Read-Proof Hardware from Protective Coatings
-
Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
-
Tuyls, P., Schrijen, G.-J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.-J.2
Škorić, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
32
-
-
78650185683
-
Hardware intrinsic security from D flip-flops
-
ACM, New York
-
van der Leest, V., Schrijen, G.-J., Handschuh, H., Tuyls, P.: Hardware intrinsic security from D flip-flops. In: ACM Workshop on Scalable Trusted Computing (ACM STC), pp. 53-62. ACM, New York (2010)
-
(2010)
ACM Workshop on Scalable Trusted Computing (ACM STC)
, pp. 53-62
-
-
Van Der Leest, V.1
Schrijen, G.-J.2
Handschuh, H.3
Tuyls, P.4
-
33
-
-
26444544536
-
Robust Key Extraction from Physical Uncloneable Functions
-
Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
-
Škorić, B., Tuyls, P., Ophey, W.: Robust Key Extraction from Physical Uncloneable Functions. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407-422. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3531
, pp. 407-422
-
-
Škorić, B.1
Tuyls, P.2
Ophey, W.3
|