메뉴 건너뛰기




Volumn 7344 LNCS, Issue , 2012, Pages 142-158

Converse PUF-based authentication

Author keywords

Authentication; Key Exchange; Physically Unclonable Functions (PUFs)

Indexed keywords

APPLICATION SCENARIO; AUTHENTICATED KEY EXCHANGE; AUTHENTICATION AND KEY EXCHANGE PROTOCOLS; AUTHENTICATION PROTOCOLS; AUTHENTICATION SCHEME; CHALLENGE-RESPONSE PAIR; KEY EXCHANGE; PASSIVE ADVERSARY; PHYSICALLY UNCLONABLE FUNCTIONS (PUFS); RESOURCE-CONSTRAINED; RESOURCE-RICH; SECURITY ANALYSIS;

EID: 84863085630     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-30921-2_9     Document Type: Conference Paper
Times cited : (38)

References (33)
  • 1
    • 72449124251 scopus 로고    scopus 로고
    • Memory Leakage- Resilient Encryption Based on Physically Unclonable Functions
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., Tuyls, P.: Memory Leakage- Resilient Encryption Based on Physically Unclonable Functions. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 685-702. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 685-702
    • Armknecht, F.1    Maes, R.2    Sadeghi, A.-R.3    Sunar, B.4    Tuyls, P.5
  • 2
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS 1993, pp. 62-73. ACM (1993)
    • (1993) ACM CCS 1993 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 51049117293 scopus 로고    scopus 로고
    • Efficient Helper Data Key Extractor on FPGAs
    • Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
    • Bösch, C., Guajardo, J., Sadeghi, A.-R., Shokrollahi, J., Tuyls, P.: Efficient Helper Data Key Extractor on FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 181-197. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5154 , pp. 181-197
    • Bösch, C.1    Guajardo, J.2    Sadeghi, A.-R.3    Shokrollahi, J.4    Tuyls, P.5
  • 4
    • 77649253940 scopus 로고    scopus 로고
    • On Physical Obfuscation of Cryptographic Algorithms
    • Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. Springer, Heidelberg
    • Bringer, J., Chabanne, H., Icart, T.: On Physical Obfuscation of Cryptographic Algorithms. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 88-103. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5922 , pp. 88-103
    • Bringer, J.1    Chabanne, H.2    Icart, T.3
  • 6
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 13
    • 38049015807 scopus 로고    scopus 로고
    • FPGA Intrinsic PUFs and Their Use for IP Protection
    • Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
    • Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4727 , pp. 63-80
    • Guajardo, J.1    Kumar, S.S.2    Schrijen, G.-J.3    Tuyls, P.4
  • 17
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication applications
    • IEEE June
    • Lee, J.W., Lim, D., Gassend, B., Suh, E.G., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium on VLSI Circuits, pp. 176-179. IEEE (June 2004)
    • (2004) Symposium on VLSI Circuits , pp. 176-179
    • Lee, J.W.1    Lim, D.2    Gassend, B.3    Suh, E.G.4    Van Dijk, M.5    Devadas, S.6
  • 21
    • 85016215043 scopus 로고    scopus 로고
    • Physically unclonable functions: A study on the state of the art and future research directions
    • Maes, R., Verbauwhede, I.: Physically unclonable functions: A study on the state of the art and future research directions. In: Towards Hardware-Intrinsic Security (2010)
    • (2010) Towards Hardware-Intrinsic Security
    • Maes, R.1    Verbauwhede, I.2
  • 28
    • 85008008223 scopus 로고    scopus 로고
    • A digital 1.6 pJ/bit chip identification circuit using process variations
    • Su, Y., Holleman, J., Otis, B.P.: A digital 1.6 pJ/bit chip identification circuit using process variations. IEEE Journal of Solid-State Circuits 43(1), 69-77 (2008)
    • (2008) IEEE Journal of Solid-State Circuits , vol.43 , Issue.1 , pp. 69-77
    • Su, Y.1    Holleman, J.2    Otis, B.P.3
  • 29
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • IEEE June
    • Suh, E.G., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: ACM/IEEE Design Automation Conference (DAC), pp. 9-14. IEEE (June 2007)
    • (2007) ACM/IEEE Design Automation Conference (DAC) , pp. 9-14
    • Suh, E.G.1    Devadas, S.2
  • 30
    • 33745654539 scopus 로고    scopus 로고
    • RFID-Tags for Anti-counterfeiting
    • Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
    • Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115-131. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3860 , pp. 115-131
    • Tuyls, P.1    Batina, L.2
  • 31
    • 33750726983 scopus 로고    scopus 로고
    • Read-Proof Hardware from Protective Coatings
    • Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
    • Tuyls, P., Schrijen, G.-J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4249 , pp. 369-383
    • Tuyls, P.1    Schrijen, G.-J.2    Škorić, B.3    Van Geloven, J.4    Verhaegh, N.5    Wolters, R.6
  • 33
    • 26444544536 scopus 로고    scopus 로고
    • Robust Key Extraction from Physical Uncloneable Functions
    • Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
    • Škorić, B., Tuyls, P., Ophey, W.: Robust Key Extraction from Physical Uncloneable Functions. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407-422. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3531 , pp. 407-422
    • Škorić, B.1    Tuyls, P.2    Ophey, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.