-
1
-
-
78650134144
-
Anonymous Authentication for RFID Systems
-
Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
-
Armknecht, F., Chen, L., Sadeghi, A.R., Wachsmann, C.: Anonymous Authentication for RFID Systems. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 158-175. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6370
, pp. 158-175
-
-
Armknecht, F.1
Chen, L.2
Sadeghi, A.R.3
Wachsmann, C.4
-
2
-
-
80051967839
-
A formal foundation for the security features of physical functions
-
IEEE May
-
Armknecht, F., Maes, R., Sadeghi, A.R., Standaert, F.X.,Wachsmann, C.: A formal foundation for the security features of physical functions. In: IEEE Symposium on Security and Privacy, pp. 397-412. IEEE (May 2011)
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 397-412
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.R.3
Standaert, F.X.4
Wachsmann, C.5
-
3
-
-
72449124251
-
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Armknecht, F., Maes, R., Sadeghi, A.R., Sunar, B., Tuyls, P.: Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 685-702. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 685-702
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.R.3
Sunar, B.4
Tuyls, P.5
-
4
-
-
78650333960
-
When compromised readers meet RFID
-
Avoine, G., Lauradoux, C., Martin, T.: When compromised readers meet RFID. In: The 5th Workshop on RFID Security, RFIDSec (2009)
-
The 5th Workshop on RFID Security, RFIDSec (2009)
-
-
Avoine, G.1
Lauradoux, C.2
Martin, T.3
-
5
-
-
80053502266
-
Spongent: A Lightweight Hash Function
-
Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
-
Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varici, K., Verbauwhede, I.: spongent: A Lightweight Hash Function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312-325. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6917
, pp. 312-325
-
-
Bogdanov, A.1
Knežević, M.2
Leander, G.3
Toz, D.4
Varici, K.5
Verbauwhede, I.6
-
7
-
-
51049117293
-
Efficient Helper Data Key Extractor on FPGAs
-
Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
-
Bösch, C., Guajardo, J., Sadeghi, A.-R., Shokrollahi, J., Tuyls, P.: Efficient Helper Data Key Extractor on FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 181-197. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5154
, pp. 181-197
-
-
Bösch, C.1
Guajardo, J.2
Sadeghi, A.-R.3
Shokrollahi, J.4
Tuyls, P.5
-
9
-
-
52449089460
-
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
-
Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. Springer, Heidelberg
-
Bringer, J., Chabanne, H., Icart, T.: Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 77-91. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5229
, pp. 77-91
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
10
-
-
49049105769
-
Design and implementation of PUF-based unclonable RFID ICs for Anti-Counterfeiting and security applications
-
IEEE
-
Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., Khandelwal, V.: Design and implementation of PUF-based unclonable RFID ICs for Anti-Counterfeiting and security applications. In: International Conference on RFID, pp. 58-64. IEEE (2008)
-
(2008)
International Conference on RFID
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
11
-
-
33749541274
-
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 232-250. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 232-250
-
-
Dodis, Y.1
Katz, J.2
Reyzin, L.3
Smith, A.4
-
12
-
-
35048865463
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
13
-
-
57049128814
-
Dismantling MIFARE Classic
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Garcia, F.D., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R.W., Jacobs, B.: Dismantling MIFARE Classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97-114. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 97-114
-
-
Garcia, F.D.1
De Koning Gans, G.2
Muijrers, R.3
Van Rossum, P.4
Verdult, R.5
Schreur, R.W.6
Jacobs, B.7
-
14
-
-
46449138830
-
Controlled physical random functions
-
IEEE
-
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled physical random functions. In: Computer Security Applications Conference, pp. 149-160. IEEE (2002)
-
(2002)
Computer Security Applications Conference
, pp. 149-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
15
-
-
0038341105
-
Silicon physical random functions
-
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security (ACM CCS), pp. 148-160 (2002)
-
(2002)
ACM Conference on Computer and Communications Security (ACM CCS)
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
16
-
-
38049015807
-
FPGA Intrinsic PUFs and Their Use for IP Protection
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
17
-
-
84865807912
-
Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs
-
ePrint Archive (to appear)
-
van Herrewege, A., Katzenbeisser, S., Maes, R., Peeters, R., Sadeghi, A.R., Verbauwhede, I., Wachsmann, C.: Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs. Cryptology ePrint Archive (to appear)
-
Cryptology
-
-
Van Herrewege, A.1
Katzenbeisser, S.2
Maes, R.3
Peeters, R.4
Sadeghi, A.R.5
Verbauwhede, I.6
Wachsmann, C.7
-
18
-
-
50249134033
-
Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
-
Holcomb, D.E., Burleson, W.P., Fu, K.: Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Conference on RFID Security, RFIDSec (2007)
-
Conference on RFID Security, RFIDSec (2007)
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
19
-
-
84860784355
-
A novel RFID distance bounding protocol based on physically unclonable functions
-
ePrint Archive, Report 2011/075
-
Kardas, S., Kiraz, M.S., Bingol, M.A., Demirci, H.: A novel RFID distance bounding protocol based on physically unclonable functions. Cryptology ePrint Archive, Report 2011/075 (2011)
-
(2011)
Cryptology
-
-
Kardas, S.1
Kiraz, M.S.2
Bingol, M.A.3
Demirci, H.4
-
20
-
-
80053484096
-
Recyclable PUFs: Logically Reconfigurable PUFs
-
Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
-
Katzenbeisser, S., Koçabas, Ü., van der Leest, V., Sadeghi, A.-R., Schrijen, G.-J., Schröder, H., Wachsmann, C.: Recyclable PUFs: Logically Reconfigurable PUFs. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 374-389. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6917
, pp. 374-389
-
-
Katzenbeisser, S.1
Koçabas, Ü.2
Van Der Leest, V.3
Sadeghi, A.-R.4
Schrijen, G.-J.5
Schröder, H.6
Wachsmann, C.7
-
21
-
-
51849144293
-
Extended abstract: The butterfly PUF protecting IP on every FPGA
-
Kumar, S., Guajardo, J., Maes, R., Schrijen, G.J., Tuyls, P.: Extended abstract: The butterfly PUF protecting IP on every FPGA. In: IEEE Workshop on Hardware-Oriented Security and Trust (HOST), pp. 67-70 (2008)
-
(2008)
IEEE Workshop on Hardware-Oriented Security and Trust (HOST)
, pp. 67-70
-
-
Kumar, S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.J.4
Tuyls, P.5
-
22
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication application
-
Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication application. In: Symposium on VLSI Circuits, pp. 176-159 (2004)
-
(2004)
Symposium on VLSI Circuits
, pp. 176-1159
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
23
-
-
78650185683
-
Hardware intrinsic security from D flip-flops
-
van der Leest, V., Schrijen, G.J., Handschuh, H., Tuyls, P.: Hardware intrinsic security from D flip-flops. In: ACM Workshop on Scalable Trusted Computing (ACM STC), pp. 53-62 (2010)
-
(2010)
ACM Workshop on Scalable Trusted Computing (ACM STC)
, pp. 53-62
-
-
Van Der Leest, V.1
Schrijen, G.J.2
Handschuh, H.3
Tuyls, P.4
-
24
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Lim, D., Lee, J.W., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Transactions on VLSI Systems 13(10), 1200-1205 (2005)
-
(2005)
IEEE Transactions on VLSI Systems
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
25
-
-
77957943386
-
Low-power sub-threshold design of secure physical unclonable functions
-
Lin, L., Holcomb, D., Krishnappa, D.K., Shabadi, P., Burleson, W.: Low-power sub-threshold design of secure physical unclonable functions. In: International Symposium on Low Power Electronics and Design (ISLPED), pp. 43-48 (2010)
-
(2010)
International Symposium on Low Power Electronics and Design (ISLPED)
, pp. 43-48
-
-
Lin, L.1
Holcomb, D.2
Krishnappa, D.K.3
Shabadi, P.4
Burleson, W.5
-
26
-
-
77949345944
-
Intrinsic PUFs from flip-flops on reconfigurable devices
-
Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic PUFs from flip-flops on reconfigurable devices. In: Workshop on Information and System Security (WISSec), p. 17 (2008)
-
(2008)
Workshop on Information and System Security (WISSec)
, pp. 17
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
27
-
-
85016215043
-
Physically unclonable functions: A study on the state of the art and future research directions
-
Springer
-
Maes, R., Verbauwhede, I.: Physically unclonable functions: A study on the state of the art and future research directions. In: Towards Hardware-Intrinsic Security, pp. 3-37. Springer (2010)
-
(2010)
Towards Hardware-Intrinsic Security
, pp. 3-37
-
-
Maes, R.1
Verbauwhede, I.2
-
28
-
-
77955766025
-
A large scale characterization of RO-PUF
-
Maiti, A., Casarona, J., McHale, L., Schaumont, P.: A large scale characterization of RO-PUF. In: IEEE Symposium on Hardware-Oriented Security and Trust (HOST), pp. 94-99 (2010)
-
(2010)
IEEE Symposium on Hardware-Oriented Security and Trust (HOST)
, pp. 94-99
-
-
Maiti, A.1
Casarona, J.2
McHale, L.3
Schaumont, P.4
-
29
-
-
78650161596
-
Readers behaving badly: Reader revocation in PKI-based RFID systems
-
ePrint Archive, Report 2009/465
-
Nithyanand, R., Tsudik, G., Uzun, E.: Readers behaving badly: Reader revocation in PKI-based RFID systems. Cryptology ePrint Archive, Report 2009/465 (2009)
-
(2009)
Cryptology
-
-
Nithyanand, R.1
Tsudik, G.2
Uzun, E.3
-
30
-
-
49149115221
-
Towards robust low cost authentication for pervasive devices
-
IEEE
-
Öztürk, E., Hammouri, G., Sunar, B.: Towards robust low cost authentication for pervasive devices. In: International Conference on Pervasive Computing and Communications (PerCom), pp. 170-178. IEEE (2008)
-
(2008)
International Conference on Pervasive Computing and Communications (PerCom)
, pp. 170-178
-
-
Öztürk, E.1
Hammouri, G.2
Sunar, B.3
-
31
-
-
0037144430
-
Physical one-way functions
-
Pappu, R.S., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297, 2026-2030 (2002)
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.S.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
33
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: ACM Conference on Computer and Communications Security (ACM CCS), pp. 237-249 (2010)
-
(2010)
ACM Conference on Computer and Communications Security (ACM CCS)
, pp. 237-249
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
34
-
-
85019715933
-
Enhancing RFID Security and Privacy by Physically Unclonable Functions
-
Springer
-
Sadeghi, A.R., Visconti, I., Wachsmann, C.: Enhancing RFID Security and Privacy by Physically Unclonable Functions. In: Towards Hardware-Intrinsic Security, pp. 281-305. Springer (2010)
-
(2010)
Towards Hardware-Intrinsic Security
, pp. 281-305
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
36
-
-
34548818732
-
A 1.6pJ/bit 96% stable chip-ID generating circuit using process variations
-
Su, Y., Holleman, J., Otis, B.: A 1.6pJ/bit 96% stable chip-ID generating circuit using process variations. In: IEEE International Solid-State Circuits Conference (ISSCC), pp. 406-611 (2007)
-
(2007)
IEEE International Solid-State Circuits Conference (ISSCC)
, pp. 406-611
-
-
Su, Y.1
Holleman, J.2
Otis, B.3
-
37
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference, pp. 9-14 (2007)
-
(2007)
Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
38
-
-
33745654539
-
RFID-Tags for Anti-counterfeiting
-
Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
-
Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115-131. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
39
-
-
33750726983
-
Read-Proof Hardware from Protective Coatings
-
Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
-
Tuyls, P., Schrijen, G.J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.J.2
Škorić, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
40
-
-
26444544536
-
Robust Key Extraction from Physical Uncloneable Functions
-
Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
-
Škorić, B., Tuyls, P., Ophey,W.: Robust Key Extraction from Physical Uncloneable Functions. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407-422. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3531
, pp. 407-422
-
-
Škorić, B.1
Tuyls, P.2
Ophey, W.3
|