메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1-6

Complementary IBS: Application specific error correction for PUFs

Author keywords

ASIC; Error Correction; FPGA; Fuzzy Embedder; Index Based Syndrome Coding; Physical Unclonable Function (PUF)

Indexed keywords

APPLICATION SPECIFIC; APPLICATION SPECIFIC TRADEOFF; CRYPTOGRAPHIC APPLICATIONS; DATA SIZE; DECODER COMPLEXITY; ERROR CORRECTION CAPABILITY; FUZZY EMBEDDER; HARDWARE IMPLEMENTATIONS; IMPLEMENTATION COMPLEXITY; INDEX-BASED SYNDROME CODING; KEY GENERATION; PHYSICAL UNCLONABLE FUNCTIONS; RESOURCE-CONSTRAINED;

EID: 84864149092     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HST.2012.6224310     Document Type: Conference Paper
Times cited : (60)

References (15)
  • 1
    • 84864150670 scopus 로고    scopus 로고
    • Hardware intrinsic security : fabless perception and awareness
    • C. Boone and P. Tuyls, "Hardware intrinsic security : Fabless perception and awareness," Future FAB, 2011.
    • (2011) Future FAB
    • Boone, C.1    Tuyls, P.2
  • 2
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
    • G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in ACM/IEEE Design Automation Conference (DAC), 2007, pp. 9-14. (Pubitemid 47129916)
    • (2007) Proceedings - Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 3
    • 38049015807 scopus 로고    scopus 로고
    • FPGA intrinsic PUFs and their use for IP protection
    • ser. LNCS, P. Paillier and I. Verbauwhede, Eds Springer
    • J. Guajardo, S. S. Kumar, G. J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," in Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, P. Paillier and I. Verbauwhede, Eds., vol. 4727. Springer, 2007, pp. 63-80.
    • (2007) Cryptographic Hardware and Embedded Systems (CHES) , vol.4727 , pp. 63-80
    • Guajardo, J.1    Kumar, S.S.2    Schrijen, G.J.3    Tuyls, P.4
  • 5
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • ser. LNCS, C. Cachin and J. L. Camenisch, Eds. Springer
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology (EUROCRYPT), ser. LNCS, C. Cachin and J. L. Camenisch, Eds., vol. 3027. Springer, 2004, pp. 523-540.
    • (2004) Advances in Cryptology (EUROCRYPT) , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 6
    • 76949095784 scopus 로고    scopus 로고
    • Secure and robust error correction for physical unclonable functions
    • M.-D. Yu and S. Devadas, "Secure and robust error correction for physical unclonable functions," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 48-65, 2010.
    • (2010) IEEE Design & Test of Computers , vol.27 , Issue.1 , pp. 48-65
    • Yu, M.-D.1    Devadas, S.2
  • 10
    • 70350614531 scopus 로고    scopus 로고
    • Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs
    • C. Clavier and K. Gaj, Eds. Springer
    • -"Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs," in Cryptographic Hardware and Embedded Systems (CHES), C. Clavier and K. Gaj, Eds. Springer, 2009, pp. 332-347.
    • (2009) Cryptographic Hardware and Embedded Systems (CHES) , pp. 332-347
    • Maes, R.1    Tuyls, P.2    Verbauwhede, I.3
  • 11
    • 80053502788 scopus 로고    scopus 로고
    • Lightweight and secure PUF key storage using limits of machine learning
    • ser. LNCS, B. Preneel and T. Takagi, Eds. Springer
    • M.-D. Yu, D. M'Raihi, R. Sowell, and S. Devadas, "Lightweight and secure PUF key storage using limits of machine learning," in Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, B. Preneel and T. Takagi, Eds., vol. 6917. Springer, 2011, pp. 358-373.
    • (2011) Cryptographic Hardware and Embedded Systems (CHES) , vol.6917 , pp. 358-373
    • Yu, M.-D.1    M'Raihi, D.2    Sowell, R.3    Devadas, S.4
  • 13
    • 85037371734 scopus 로고    scopus 로고
    • Side-channel analysis of PUFs and fuzzy extractors
    • ser. LNCS, J. M. McCune, B. Balacheff, A. Perrig, A.-R. Sadeghi, A. Sasse, and Y. Beres, Eds. Springer
    • D. Merli, D. Schuster, F. Stumpf, and G. Sigl, "Side-channel analysis of PUFs and fuzzy extractors," in Trust and Trustworthy Computing (TRUST), ser. LNCS, J. M. McCune, B. Balacheff, A. Perrig, A.-R. Sadeghi, A. Sasse, and Y. Beres, Eds., vol. 6740. Springer, 2011, pp. 33-47.
    • (2011) Trust and Trustworthy Computing (TRUST) , vol.6740 , pp. 33-47
    • Merli, D.1    Schuster, D.2    Stumpf, F.3    Sigl, G.4
  • 14
    • 0029229981 scopus 로고
    • Soft-decision decoding of Reed-Muller codes as generalized multiple concatenated codes
    • G. Schnabl and M. Bossert, "Soft-decision decoding of Reed-Muller codes as generalized multiple concatenated codes," IEEE Transactions on Information Theory, vol. 41, no. 1, pp. 304-308, 1995.
    • (1995) IEEE Transactions on Information Theory , vol.41 , Issue.1 , pp. 304-308
    • Schnabl, G.1    Bossert, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.