-
1
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Mar.
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, " SIAM J. Comput., vol. 38, no. 1, pp. 97-139, Mar. 2008.
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
2
-
-
84874047126
-
Machine learning attacks on 65nm arbiter pufs: Accurate modeling poses strict bounds on usability
-
Dec.
-
G. Hospodar, R. Maes, and I. Verbauwhede, "Machine Learning Attacks on 65nm Arbiter PUFs: Accurate Modeling poses strict Bounds on Usability, " in IEEE International Workshop on Information Forensics and Security, WIFS 2012, pp. 37-42, Dec. 2012.
-
(2012)
IEEE International Workshop on Information Forensics and Security, WIFS 2012
, pp. 37-42
-
-
Hospodar, G.1
Maes, R.2
Verbauwhede, I.3
-
3
-
-
84870784876
-
Experimental evaluation of physically unclonable functions in 65 nm cmos
-
Sep.
-
P. Koeberl, R. Maes, V. Ro?zíc, V. Van der Leest, E. Van der Sluis, and I. Verbauwhede, "Experimental Evaluation of Physically Unclonable Functions in 65 nm CMOS, " in IEEE European Solid-State Circuits Conference, ESSCIRC 2012, pp. 486-489, Sep. 2012.
-
(2012)
IEEE European Solid-State Circuits Conference, ESSCIRC 2012
, pp. 486-489
-
-
Koeberl, P.1
Maes, R.2
Rozíc, V.3
Leest Der V.Van4
Sluis Der E.Van5
Verbauwhede, I.6
-
4
-
-
85131490867
-
Noise in semiconductor devices
-
Fundamentals of Industrial Electronics, 2nd Edition, chapter 11 CRC Press
-
A. Konczakowska and B. M. Wilamowski, "Noise in Semiconductor Devices, " Industrial Electronics Handbook, vol. 1 Fundamentals of Industrial Electronics, 2nd Edition, chapter 11, CRC Press 2011.
-
(2011)
Industrial Electronics Handbook
, vol.1
-
-
Konczakowska, A.1
Wilamowski, B.M.2
-
5
-
-
66649124356
-
Managing process variation in intel's 45nm cmos technology
-
Jun.
-
K. Kuhn, C. Kenyon, A. Kornfeld, M. Liu, A. Maheshwari, W. Shih, S. Sivakumar, G. Taylor, P. VanDerVoorn and K. Zawadzki, "Managing Process Variation in Intel's 45nm CMOS Technology, " Intel Technology Journal, vol. 12, no. 2, pp. 92-110, Jun. 2008.
-
(2008)
Intel Technology Journal
, vol.12
, Issue.2
, pp. 92-110
-
-
Kuhn, K.1
Kenyon, C.2
Kornfeld, A.3
Liu, M.4
Maheshwari, A.5
Shih, W.6
Sivakumar, S.7
Taylor, G.8
Vandervoorn, P.9
Zawadzki, K.10
-
6
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
Jun.
-
J. W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, "A technique to build a secret key in integrated circuits for identification and authentication applications, " in IEEE Symposium on VLSI Circuits, VLSIC 2004, pp. 176-179, Jun. 2004.
-
(2004)
IEEE Symposium on VLSI Circuits, VLSIC 2004
, pp. 176-179
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
7
-
-
84555217843
-
Semi-invasive em attack on FPGA RO PUFs and countermeasures
-
Oct.
-
D. Merli, D. Schuster, F. Stumpf and G. Sigl, "Semi-invasive EM attack on FPGA RO PUFs and countermeasures, " in Workshop on Embedded Systems Security, WESS 2011, pp 1-9, Oct. 2011.
-
(2011)
Workshop on Embedded Systems Security, WESS 2011
, pp. 1-9
-
-
Merli, D.1
Schuster, D.2
Stumpf, F.3
Sigl, G.4
-
8
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
Oct.
-
U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas and J. Schmidhuber, "Modeling attacks on physical unclonable functions, " in ACM conference on Computer and Communications Security, CCS 2010, pp. 237-249, Oct. 2010.
-
(2010)
ACM Conference on Computer and Communications Security, CCS 2010
, pp. 237-249
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
9
-
-
79957692700
-
Security based on Physical Unclonability and Disorder
-
Springer, Book Chapter
-
U. Rührmair, S. Devadas and F. Koushanfar, "Security based on Physical Unclonability and Disorder, " Introduction to Hardware Security and Trust, Springer, Book Chapter, 2011.
-
(2011)
Introduction to Hardware Security and Trust
-
-
Rührmair, U.1
Devadas, S.2
Koushanfar, F.3
-
10
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
Jun.
-
G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation, " in IEEE Design Automation Conference, DAC 2007, pp. 9-14, Jun. 2007.
-
(2007)
IEEE Design Automation Conference, DAC 2007
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
12
-
-
33750726983
-
Read-proof hardware from protective coatings
-
Oct.
-
P. Tuyls, G. J. Schrijen, B. Skoric, J. V. Geloven, N. Verhaegh and R. Wolters, "Read-Proof Hardware from Protective Coatings, " in Cryptographic Hardware and Embedded Systems, CHES 2006, pp. 369-383, Oct. 2006.
-
(2006)
Cryptographic Hardware and Embedded Systems, CHES 2006
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.J.2
Skoric, B.3
Geloven, J.V.4
Verhaegh, N.5
Wolters, R.6
|