-
1
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
ser. DAC '07
-
G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Proceedings of the 44th annual Design Automation Conference, ser. DAC '07, 2007, pp. 9-14.
-
(2007)
Proceedings of the 44th Annual Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
2
-
-
51749089495
-
Brand and ip protection with physical unclonable functions
-
J. Guajardo, S. Kumar, G.-J. Schrijen, and P. Tuyls, "Brand and ip protection with physical unclonable functions," in Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on, may 2008, pp. 3186-3189.
-
Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium On, May 2008
, pp. 3186-3189
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.-J.3
Tuyls, P.4
-
3
-
-
49049105769
-
Design and implementation of puf-based "unclonable" rfid ics for anti-counterfeiting and security applications
-
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal, "Design and implementation of puf-based "unclonable" rfid ics for anti-counterfeiting and security applications," in RFID, 2008 IEEE International Conference on, april 2008, pp. 58-64.
-
RFID, 2008 IEEE International Conference On, April 2008
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
4
-
-
51849144293
-
Extended abstract: The butterfly puf protecting ip on every fpga
-
S. Kumar, J. Guajardo, R. Maes, G.-J. Schrijen, and P. Tuyls, "Extended abstract: The butterfly puf protecting ip on every fpga," in Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on, 2008, pp. 67-70.
-
Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop On, 2008
, pp. 67-70
-
-
Kumar, S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.-J.4
Tuyls, P.5
-
5
-
-
38049015807
-
Fpga intrinsic pufs and their use for ip protection
-
ser. CHES '07. Berlin, Heidelberg: Springer-Verlag
-
J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, "Fpga intrinsic pufs and their use for ip protection," in Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, ser. CHES '07. Berlin, Heidelberg: Springer-Verlag, 2007, pp. 63-80.
-
(2007)
Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
6
-
-
68949175522
-
Power-up sram state as an identifying fingerprint and source of true random numbers
-
sept.
-
D. Holcomb, W. Burleson, and K. Fu, "Power-up sram state as an identifying fingerprint and source of true random numbers," Computers, IEEE Transactions on, vol. 58, no. 9, pp. 1198-1210, sept. 2009.
-
(2009)
Computers, IEEE Transactions on
, vol.58
, Issue.9
, pp. 1198-1210
-
-
Holcomb, D.1
Burleson, W.2
Fu, K.3
-
7
-
-
77949345944
-
Intrinsic pufs from flip-flops on reconfigurable devices
-
R. Maes, P. Tuyls, and I. Verbauwhede, "Intrinsic pufs from flip-flops on reconfigurable devices," in 3rd Benelux Workshop on Information and System Security (WISSec 2008), Eindhoven,NL, 2008, p. 17.
-
3rd Benelux Workshop on Information and System Security (WISSec 2008), Eindhoven,NL, 2008
, pp. 17
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
8
-
-
78549237663
-
Self-measurement of combinatorial circuit delays in fpgas
-
June
-
J. S. J. Wong, P. Sedcole, and P. Y. K. Cheung, "Self-measurement of combinatorial circuit delays in fpgas," ACM Trans. Reconfigurable Technol. Syst., vol. 2, pp. 10:1-10:22, June 2009.
-
(2009)
ACM Trans. Reconfigurable Technol. Syst.
, vol.2
-
-
Wong, J.S.J.1
Sedcole, P.2
Cheung, P.Y.K.3
-
9
-
-
27544441530
-
Design and implementation of the aegis single-chip secure processor using physical random functions
-
G. Suh, C. O'Donnell, I. Sachdev, and S. Devadas, "Design and implementation of the aegis single-chip secure processor using physical random functions," in Computer Architecture, 2005. ISCA '05. Proceedings. 32nd International Symposium on, june 2005, pp. 25-36.
-
Computer Architecture, 2005. ISCA '05. Proceedings. 32nd International Symposium On, June 2005
, pp. 25-36
-
-
Suh, G.1
O'Donnell, C.2
Sachdev, I.3
Devadas, S.4
-
10
-
-
70350743267
-
Hardware authentication leveraging performance limits in detailed simulations and emulations
-
ser. DAC '09
-
D. Y. Deng, A. H. Chan, and G. E. Suh, "Hardware authentication leveraging performance limits in detailed simulations and emulations," in Proceedings of the 46th Annual Design Automation Conference, ser. DAC '09, 2009, pp. 682-687.
-
(2009)
Proceedings of the 46th Annual Design Automation Conference
, pp. 682-687
-
-
Deng, D.Y.1
Chan, A.H.2
Suh, G.E.3
-
11
-
-
78549254941
-
Fpga time-bounded unclonable authentication
-
ser. IH'10. Berlin, Heidelberg: Springer-Verlag
-
M. Majzoobi, A. Elnably, and F. Koushanfar, "Fpga time-bounded unclonable authentication," in Proceedings of the 12th international conference on Information hiding, ser. IH'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 1-16.
-
(2010)
Proceedings of the 12th International Conference on Information Hiding
, pp. 1-16
-
-
Majzoobi, M.1
Elnably, A.2
Koushanfar, F.3
|