메뉴 건너뛰기




Volumn 7397 LNCS, Issue , 2012, Pages 374-389

Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION SCHEME; CRITICAL DATA; ELECTRONIC PAYMENT; EXPENSIVE HARDWARE; FUZZY EXTRACTORS; HARDWARE ATTACK; MUTUAL AUTHENTICATION; PHYSICAL CHARACTERISTICS; PROOF OF CONCEPT; RESOURCECONSTRAINED DEVICES; SERVICE ATTACK; TICKETING SYSTEMS;

EID: 84865824388     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32946-3_27     Document Type: Conference Paper
Times cited : (150)

References (40)
  • 1
    • 78650134144 scopus 로고    scopus 로고
    • Anonymous Authentication for RFID Systems
    • Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
    • Armknecht, F., Chen, L., Sadeghi, A.R., Wachsmann, C.: Anonymous Authentication for RFID Systems. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 158-175. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6370 , pp. 158-175
    • Armknecht, F.1    Chen, L.2    Sadeghi, A.R.3    Wachsmann, C.4
  • 3
    • 72449124251 scopus 로고    scopus 로고
    • Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Armknecht, F., Maes, R., Sadeghi, A.R., Sunar, B., Tuyls, P.: Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 685-702. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 685-702
    • Armknecht, F.1    Maes, R.2    Sadeghi, A.R.3    Sunar, B.4    Tuyls, P.5
  • 5
    • 80053502266 scopus 로고    scopus 로고
    • Spongent: A Lightweight Hash Function
    • Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
    • Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varici, K., Verbauwhede, I.: spongent: A Lightweight Hash Function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312-325. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6917 , pp. 312-325
    • Bogdanov, A.1    Knežević, M.2    Leander, G.3    Toz, D.4    Varici, K.5    Verbauwhede, I.6
  • 7
    • 51049117293 scopus 로고    scopus 로고
    • Efficient Helper Data Key Extractor on FPGAs
    • Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
    • Bösch, C., Guajardo, J., Sadeghi, A.-R., Shokrollahi, J., Tuyls, P.: Efficient Helper Data Key Extractor on FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 181-197. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5154 , pp. 181-197
    • Bösch, C.1    Guajardo, J.2    Sadeghi, A.-R.3    Shokrollahi, J.4    Tuyls, P.5
  • 9
    • 52449089460 scopus 로고    scopus 로고
    • Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
    • Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. Springer, Heidelberg
    • Bringer, J., Chabanne, H., Icart, T.: Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 77-91. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5229 , pp. 77-91
    • Bringer, J.1    Chabanne, H.2    Icart, T.3
  • 10
    • 49049105769 scopus 로고    scopus 로고
    • Design and implementation of PUF-based unclonable RFID ICs for Anti-Counterfeiting and security applications
    • IEEE
    • Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., Khandelwal, V.: Design and implementation of PUF-based unclonable RFID ICs for Anti-Counterfeiting and security applications. In: International Conference on RFID, pp. 58-64. IEEE (2008)
    • (2008) International Conference on RFID , pp. 58-64
    • Devadas, S.1    Suh, E.2    Paral, S.3    Sowell, R.4    Ziola, T.5    Khandelwal, V.6
  • 11
    • 33749541274 scopus 로고    scopus 로고
    • Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 232-250. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 232-250
    • Dodis, Y.1    Katz, J.2    Reyzin, L.3    Smith, A.4
  • 12
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 13
    • 57049128814 scopus 로고    scopus 로고
    • Dismantling MIFARE Classic
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Garcia, F.D., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R.W., Jacobs, B.: Dismantling MIFARE Classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97-114. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 97-114
    • Garcia, F.D.1    De Koning Gans, G.2    Muijrers, R.3    Van Rossum, P.4    Verdult, R.5    Schreur, R.W.6    Jacobs, B.7
  • 16
    • 38049015807 scopus 로고    scopus 로고
    • FPGA Intrinsic PUFs and Their Use for IP Protection
    • Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
    • Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4727 , pp. 63-80
    • Guajardo, J.1    Kumar, S.S.2    Schrijen, G.J.3    Tuyls, P.4
  • 19
    • 84860784355 scopus 로고    scopus 로고
    • A novel RFID distance bounding protocol based on physically unclonable functions
    • ePrint Archive, Report 2011/075
    • Kardas, S., Kiraz, M.S., Bingol, M.A., Demirci, H.: A novel RFID distance bounding protocol based on physically unclonable functions. Cryptology ePrint Archive, Report 2011/075 (2011)
    • (2011) Cryptology
    • Kardas, S.1    Kiraz, M.S.2    Bingol, M.A.3    Demirci, H.4
  • 20
    • 80053484096 scopus 로고    scopus 로고
    • Recyclable PUFs: Logically Reconfigurable PUFs
    • Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
    • Katzenbeisser, S., Koçabas, Ü., van der Leest, V., Sadeghi, A.-R., Schrijen, G.-J., Schröder, H., Wachsmann, C.: Recyclable PUFs: Logically Reconfigurable PUFs. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 374-389. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6917 , pp. 374-389
    • Katzenbeisser, S.1    Koçabas, Ü.2    Van Der Leest, V.3    Sadeghi, A.-R.4    Schrijen, G.-J.5    Schröder, H.6    Wachsmann, C.7
  • 22
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication application
    • Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication application. In: Symposium on VLSI Circuits, pp. 176-159 (2004)
    • (2004) Symposium on VLSI Circuits , pp. 176-1159
    • Lee, J.W.1    Lim, D.2    Gassend, B.3    Suh, G.E.4    Van Dijk, M.5    Devadas, S.6
  • 27
    • 85016215043 scopus 로고    scopus 로고
    • Physically unclonable functions: A study on the state of the art and future research directions
    • Springer
    • Maes, R., Verbauwhede, I.: Physically unclonable functions: A study on the state of the art and future research directions. In: Towards Hardware-Intrinsic Security, pp. 3-37. Springer (2010)
    • (2010) Towards Hardware-Intrinsic Security , pp. 3-37
    • Maes, R.1    Verbauwhede, I.2
  • 29
    • 78650161596 scopus 로고    scopus 로고
    • Readers behaving badly: Reader revocation in PKI-based RFID systems
    • ePrint Archive, Report 2009/465
    • Nithyanand, R., Tsudik, G., Uzun, E.: Readers behaving badly: Reader revocation in PKI-based RFID systems. Cryptology ePrint Archive, Report 2009/465 (2009)
    • (2009) Cryptology
    • Nithyanand, R.1    Tsudik, G.2    Uzun, E.3
  • 34
    • 85019715933 scopus 로고    scopus 로고
    • Enhancing RFID Security and Privacy by Physically Unclonable Functions
    • Springer
    • Sadeghi, A.R., Visconti, I., Wachsmann, C.: Enhancing RFID Security and Privacy by Physically Unclonable Functions. In: Towards Hardware-Intrinsic Security, pp. 281-305. Springer (2010)
    • (2010) Towards Hardware-Intrinsic Security , pp. 281-305
    • Sadeghi, A.R.1    Visconti, I.2    Wachsmann, C.3
  • 37
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference, pp. 9-14 (2007)
    • (2007) Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 38
    • 33745654539 scopus 로고    scopus 로고
    • RFID-Tags for Anti-counterfeiting
    • Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
    • Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115-131. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3860 , pp. 115-131
    • Tuyls, P.1    Batina, L.2
  • 39
    • 33750726983 scopus 로고    scopus 로고
    • Read-Proof Hardware from Protective Coatings
    • Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
    • Tuyls, P., Schrijen, G.J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4249 , pp. 369-383
    • Tuyls, P.1    Schrijen, G.J.2    Škorić, B.3    Van Geloven, J.4    Verhaegh, N.5    Wolters, R.6
  • 40
    • 26444544536 scopus 로고    scopus 로고
    • Robust Key Extraction from Physical Uncloneable Functions
    • Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
    • Škorić, B., Tuyls, P., Ophey,W.: Robust Key Extraction from Physical Uncloneable Functions. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407-422. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3531 , pp. 407-422
    • Škorić, B.1    Tuyls, P.2    Ophey, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.