-
2
-
-
84866637507
-
Physical Unclonable Functions in the Universal Composition Framework
-
Full version of the paper. Report 2011/681, Downloaded March 2012
-
C. Brzuska, M. Fischlin, H. Schröder, S. Katzenbeisser: Physical Unclonable Functions in the Universal Composition Framework. Full version of the paper. Cryptology ePrint Archive, Report 2011/681, 2011. Downloaded March 2012.
-
(2011)
Cryptology ePrint Archive
-
-
Brzuska, C.1
Fischlin, M.2
Schröder, H.3
Katzenbeisser, S.4
-
3
-
-
0035163054
-
Universally Composable Security: A New Paradigm for Cryptographic Protocols
-
R. Canetti: Universally Composable Security: A New Paradigm for Cryptographic Protocols. FOCS 2001: 136-145.
-
(2001)
FOCS
, pp. 136-145
-
-
Canetti, R.1
-
4
-
-
80051978427
-
The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions
-
Q. Chen, G. Csaba, P. Lugli, U. Schlichtmann, U. Rührmair: The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions. HOST 2011: 134-141
-
(2011)
HOST
, pp. 134-141
-
-
Chen, Q.1
Csaba, G.2
Lugli, P.3
Schlichtmann, U.4
Rührmair, U.5
-
5
-
-
84881239143
-
System and method of reliable forward secret key sharing with physical random functions
-
US Patent No. 7,653,197, October
-
M. van Dijk: System and method of reliable forward secret key sharing with physical random functions. US Patent No. 7,653,197, October 2004.
-
(2004)
-
-
Van Dijk, M.1
-
6
-
-
84866657085
-
Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results
-
Report 2012/228, Downloaded April 2012
-
M. van Dijk, U. Rührmair: Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results. Cryptology ePrint Archive, Report 2012/228, 2012. Downloaded April 2012.
-
(2012)
Cryptology ePrint Archive
-
-
Van Dijk, M.1
Rührmair, U.2
-
8
-
-
39149145168
-
Controlled physical random functions and applications
-
B. Gassend, M. van Dijk, D.E. Clarke, E. Torlak, S. Devadas, P. Tuyls: Controlled physical random functions and applications. ACM TISSEC 10(4), 2008.
-
(2008)
ACM TISSEC
, vol.10
, Issue.4
-
-
Gassend, B.1
Van Dijk, M.2
Clarke, D.E.3
Torlak, E.4
Devadas, S.5
Tuyls, P.6
-
10
-
-
4344587804
-
Identification and authentication of integrated circuits
-
B. Gassend, D. Lim, D. Clarke, M. van Dijk, S. Devadas: Identification and authentication of integrated circuits. Concurrency and Computation: Practice & Experience, pp. 1077-1098, Volume 16, Issue 11, 2004.
-
(2004)
Concurrency and Computation: Practice & Experience
, vol.16
, Issue.11
, pp. 1077-1098
-
-
Gassend, B.1
Lim, D.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
-
13
-
-
84881258838
-
Recyclable PUFs: Logically Reconfigurable PUFs
-
S. Katzenbeisser, Ü. Koçabas, V. van der Leest, A.-R. Sadeghi, G. J. Schrijen, C. Wachsmann: Recyclable PUFs: Logically Reconfigurable PUFs. Journal of Cryptographic Engineering 1(3): 177-186 (2011)
-
(2011)
Journal of Cryptographic Engineering
, vol.1
, Issue.3
, pp. 177-186
-
-
Katzenbeisser, S.1
Koçabas, Ü.2
Van Der Leest, V.3
Sadeghi, A.-R.4
Schrijen, G.J.5
Wachsmann, C.6
-
14
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
J. Kilian: Founding cryptography on oblivious transfer. STOC, 1988
-
(1988)
STOC
-
-
Kilian, J.1
-
15
-
-
51849144293
-
The Butterfly PUF: Protecting IP on every FPGA
-
S. S. Kumar, J. Guajardo, R. Maes, G. J. Schrijen, P. Tuyls: The Butterfly PUF: Protecting IP on every FPGA. HOST 2008: 67-70
-
(2008)
HOST
, pp. 67-70
-
-
Kumar, S.S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.J.4
Tuyls, P.5
-
16
-
-
70449096107
-
Reconfigurable physical unclonable functions - Enabling technology for tamper-resistant storage
-
K. Kursawe, A. R. Sadeghi, D. Schellekens, P. Tuyls, B. Skoric: Reconfigurable physical unclonable functions - Enabling technology for tamper-resistant storage. HOST 2009: 22-29.
-
(2009)
HOST
, pp. 22-29
-
-
Kursawe, K.1
Sadeghi, A.R.2
Schellekens, D.3
Tuyls, P.4
Skoric, B.5
-
17
-
-
4544381402
-
A technique to build a secret key in integrated circuits with identification and authentication applications
-
J.-W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas. A technique to build a secret key in integrated circuits with identification and authentication applications. In Proceedings of the IEEE VLSI Circuits Symposium, 2004.
-
Proceedings of the IEEE VLSI Circuits Symposium, 2004
-
-
Lee, J.-W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
18
-
-
84883419777
-
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
-
Report 2012/143, First version downloaded in April 2012. Throughout our paper, we refer to the numbering of figures and protocols of the latest version of Ostrovsky et al. that was available at the time of preparing our camera ready paper. This latest version stems from Nov. 14, 2012
-
R. Ostrovsky, A. Scafuro, I. Visconti, A. Wadia: Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions. Cryptology ePrint Archive, Report 2012/143, 2012. First version downloaded in April 2012. Throughout our paper, we refer to the numbering of figures and protocols of the latest version of Ostrovsky et al. that was available at the time of preparing our camera ready paper. This latest version stems from Nov. 14, 2012.
-
(2012)
Cryptology ePrint Archive
-
-
Ostrovsky, R.1
Scafuro, A.2
Visconti, I.3
Wadia, A.4
-
19
-
-
3242749566
-
-
PhD Thesis, Massachusetts Institute of Technology
-
R. Pappu: Physical One-Way Functions. PhD Thesis, Massachusetts Institute of Technology, 2001.
-
(2001)
Physical One-Way Functions
-
-
Pappu, R.1
-
20
-
-
0037144430
-
Physical One-Way Functions
-
20 September
-
R. Pappu, B. Recht, J. Taylor, N. Gershenfeld: Physical One-Way Functions, Science, vol. 297, pp. 2026-2030, 20 September 2002.
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
21
-
-
84866651452
-
Illegitimi non carborundum
-
Invited keynote talk
-
R. Rivest: Illegitimi non carborundum. Invited keynote talk, CRYPTO 2011.
-
(2011)
CRYPTO
-
-
Rivest, R.1
-
22
-
-
77954743811
-
Oblivious Transfer based on Physical Unclonable Functions
-
Springer
-
U. Rührmair: Oblivious Transfer based on Physical Unclonable Functions. TRUST 2010, pp. 430-440, Springer 2010.
-
(2010)
TRUST 2010
, pp. 430-440
-
-
Rührmair, U.1
-
23
-
-
84903837858
-
Strong PUFs: Models, Constructions and Security Proofs
-
A.-R. Sadeghi, P. Tuyls (Editors): Springer
-
U. Rührmair, H. Busch, S. Katzenbeisser: Strong PUFs: Models, Constructions and Security Proofs. In A.-R. Sadeghi, P. Tuyls (Editors): Towards Hardware Intrinsic Security: Foundation and Practice. Springer, 2010.
-
(2010)
Towards Hardware Intrinsic Security: Foundation and Practice
-
-
Rührmair, U.1
Busch, H.2
Katzenbeisser, S.3
-
26
-
-
84964429179
-
An Attack on PUF-based Session Key Exchange and a Hardware-based Countermeasure: Erasable PUFs
-
Springer
-
U. Rührmair, C. Jaeger, M. Algasinger: An Attack on PUF-based Session Key Exchange and a Hardware-based Countermeasure: Erasable PUFs. Financial Cryptography (FC 2011), Springer, 2011.
-
(2011)
Financial Cryptography (FC 2011)
-
-
Rührmair, U.1
Jaeger, C.2
Algasinger, M.3
-
27
-
-
79955919867
-
Cryptographic Applications of High-Capacity Crossbar Memories
-
U. Rührmair, C. Jaeger, M. Bator, M. Stutzmann, P. Lugli, and G. Csaba: Cryptographic Applications of High-Capacity Crossbar Memories. IEEE Transactions on Nanotechnology, 2011.
-
(2011)
IEEE Transactions on Nanotechnology
-
-
Rührmair, U.1
Jaeger, C.2
Bator, M.3
Stutzmann, M.4
Lugli, P.5
Csaba, G.6
-
28
-
-
78649989155
-
Modeling Attacks on Physical Unclonable Functions
-
U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, J. Schmidhuber: Modeling Attacks on Physical Unclonable Functions. ACM Conference on Computer and Communications Security (CCS'10), 2010.
-
(2010)
ACM Conference on Computer and Communications Security (CCS'10)
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
30
-
-
34547307341
-
Physical Unclonable Functions for Device Authentication and Secret Key Generation
-
G. E. Suh, S. Devadas: Physical Unclonable Functions for Device Authentication and Secret Key Generation. DAC 2007: 9-14
-
(2007)
DAC
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
31
-
-
33750726983
-
Read-proof hardware from protective coatings
-
Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings
-
P. Tuyls, G. J. Schrijen, B. Skoric, J. van Geloven, N. Verhaegh, R. Wolters Read-Proof Hardware from Protective Coatings. CHES 2006, pp. 369-383, 2006. (Pubitemid 44700070)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4249 LNCS
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.-J.2
Skoric, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
32
-
-
76649124351
-
Strong Authentication with Physical Unclonable Functions
-
M. Petkovic, W. Jonker (Eds.), Springer
-
P. Tuyls, B. Skoric: Strong Authentication with Physical Unclonable Functions. In: Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (Eds.), Springer, 2007.
-
(2007)
Security, Privacy and Trust in Modern Data Management
-
-
Tuyls, P.1
Skoric, B.2
|