메뉴 건너뛰기




Volumn 7394 LNCS, Issue , 2012, Pages 26-38

Security analysis of image-based PUFs for anti-counterfeiting

Author keywords

[No Author keywords available]

Indexed keywords

ANTI-COUNTERFEITING; COUNTERFEITING ATTACK; IMAGE-BASED; NATURAL PROPERTIES; PHYSICAL FUNCTION; SECURITY ANALYSIS; SIGNATURE SCHEME; SOUND PROTOCOL; UNDERLYING COMPONENTS; PHYSICALLY UNCLONABLE FUNCTIONS;

EID: 84866640053     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32805-3_3     Document Type: Conference Paper
Times cited : (4)

References (31)
  • 2
    • 0036505144 scopus 로고    scopus 로고
    • Next generation technologies to combat counterfeiting of electronic components
    • Bastia, S.: Next generation technologies to combat counterfeiting of electronic components. IEEE Trans. on Components and Packaging Tech. 25, 175-176 (2002)
    • (2002) IEEE Trans. on Components and Packaging Tech. , vol.25 , pp. 175-176
    • Bastia, S.1
  • 5
    • 0037144430 scopus 로고    scopus 로고
    • Physical one-way functions
    • Pappu, R., et al.: Physical one-way functions. Science 297 (2002)
    • (2002) Science , vol.297
    • Pappu, R.1
  • 9
    • 33745654539 scopus 로고    scopus 로고
    • RFID-Tags for Anti-counterfeiting
    • Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
    • Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115-131. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3860 , pp. 115-131
    • Tuyls, P.1    Batina, L.2
  • 11
    • 84866683249 scopus 로고    scopus 로고
    • Anti-counterfeiting: Mixing the physical and the digital world
    • Guajardo, J., Preneel, B., Sadeghi, A.-R., Tuyls, P. (eds.) Foundations for Forgery- Resilient Cryptographic Hardware, vol. 09282
    • Kirovski, D.: Anti-counterfeiting: Mixing the physical and the digital world. In: Guajardo, J., Preneel, B., Sadeghi, A.-R., Tuyls, P. (eds.) Foundations for Forgery- Resilient Cryptographic Hardware, vol. 09282 in Dagstuhl Seminar Proceedings (2010)
    • Dagstuhl Seminar Proceedings (2010)
    • Kirovski, D.1
  • 14
    • 57349155782 scopus 로고    scopus 로고
    • Certifying authenticity via fiber-infused paper
    • Chen, Y., Mihçak, K., Kirovski, D.: Certifying authenticity via fiber-infused paper. SIGecom Exch. 5, 29-37 (2005)
    • (2005) SIGecom Exch. , vol.5 , pp. 29-37
    • Chen, Y.1    Mihçak, K.2    Kirovski, D.3
  • 19
    • 0004134542 scopus 로고
    • Commission on Engineering Committee on Next-Generation Currency Design and National Research Council Technical Systems. The National Academies Press
    • Commission on Engineering Committee on Next-Generation Currency Design and National Research Council Technical Systems. Counterfeit Deterrent Features for the Next-Generation Currency Design. The National Academies Press (1993)
    • (1993) Counterfeit Deterrent Features for the Next-Generation Currency Design
  • 20
    • 33750726983 scopus 로고    scopus 로고
    • Read-Proof Hardware from Protective Coatings
    • Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
    • Tuyls, P., Schrijen, G.-J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4249 , pp. 369-383
    • Tuyls, P.1    Schrijen, G.-J.2    Škorić, B.3    Van Geloven, J.4    Verhaegh, N.5    Wolters, R.6
  • 23
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication applications
    • Digest of Technical Papers
    • Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: VLSI Circuits. Digest of Technical Papers, pp. 176-179 (2004)
    • (2004) VLSI Circuits , pp. 176-179
    • Lee, J.W.1    Lim, D.2    Gassend, B.3    Suh, G.E.4    Van Dijk, M.5    Devadas, S.6
  • 24
    • 38049015807 scopus 로고    scopus 로고
    • FPGA Intrinsic PUFs and Their Use for IP Protection
    • Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
    • Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4727 , pp. 63-80
    • Guajardo, J.1    Kumar, S.S.2    Schrijen, G.-J.3    Tuyls, P.4
  • 27
    • 26444544536 scopus 로고    scopus 로고
    • Robust Key Extraction from Physical Uncloneable Functions
    • Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
    • Škorić, B., Tuyls, P., Ophey, W.: Robust Key Extraction from Physical Uncloneable Functions. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 407-422. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3531 , pp. 407-422
    • Škorić, B.1    Tuyls, P.2    Ophey, W.3
  • 29
    • 72449124251 scopus 로고    scopus 로고
    • Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Armknecht, F., Maes, R., Sadeghi, A.R., Sunar, B., Tuyls, P.: Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 685-702. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 685-702
    • Armknecht, F.1    Maes, R.2    Sadeghi, A.R.3    Sunar, B.4    Tuyls, P.5
  • 30
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.