메뉴 건너뛰기




Volumn , Issue , 2013, Pages 137-142

Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise

Author keywords

[No Author keywords available]

Indexed keywords

CHALLENGE-RESPONSE PAIR; CMOS DEVICES; COMBINED ATTACKS; HARDWARE SECURITY; INFORMATION LEAKAGE; ML ALGORITHMS; MODEL ACCURACY; PHYSICALLY UNCLONABLE FUNCTIONS;

EID: 84883671628     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HST.2013.6581579     Document Type: Conference Paper
Times cited : (156)

References (12)
  • 1
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Mar.
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, " SIAM J. Comput., vol. 38, no. 1, pp. 97-139, Mar. 2008.
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 4
    • 85131490867 scopus 로고    scopus 로고
    • Noise in semiconductor devices
    • Fundamentals of Industrial Electronics, 2nd Edition, chapter 11 CRC Press
    • A. Konczakowska and B. M. Wilamowski, "Noise in Semiconductor Devices, " Industrial Electronics Handbook, vol. 1 Fundamentals of Industrial Electronics, 2nd Edition, chapter 11, CRC Press 2011.
    • (2011) Industrial Electronics Handbook , vol.1
    • Konczakowska, A.1    Wilamowski, B.M.2
  • 10
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • Jun.
    • G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation, " in IEEE Design Automation Conference, DAC 2007, pp. 9-14, Jun. 2007.
    • (2007) IEEE Design Automation Conference, DAC 2007 , pp. 9-14
    • Suh, G.E.1    Devadas, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.