-
1
-
-
80051967839
-
A formalization of the security features of physical functions
-
Armknecht, F., Maes, R., Sadeghi, A. R., Standaert, F. X., Wachsmann, C.: A formalization of the security features of physical functions. In: IEEE Symposium on Security and Privacy, pp. 397-412 (2011).
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 397-412
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.R.3
Standaert, F.X.4
Wachsmann, C.5
-
2
-
-
0036505144
-
Next generation technologies to combat counterfeiting of electronic components
-
Bastia, S.: Next generation technologies to combat counterfeiting of electronic components. IEEE Trans. Compon. Packag. Tech. 25, 175-176 (2002).
-
(2002)
IEEE Trans. Compon. Packag. Tech.
, vol.25
, pp. 175-176
-
-
Bastia, S.1
-
5
-
-
0004134542
-
-
Commission on Engineering Committee on Next-Generation Currency Design and National Research Council Technical Systems, The National Academies Press, Washington
-
Commission on Engineering Committee on Next-Generation Currency Design and National Research Council Technical Systems. Counterfeit Deterrent Features for the Next-Generation Currency Design. The National Academies Press, Washington (1993).
-
(1993)
Counterfeit Deterrent Features for the Next-Generation Currency Design
-
-
-
7
-
-
0037144430
-
Physical one-way functions
-
Pappu, R. S., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297, 2026-2030 (2002).
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.S.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
8
-
-
0038341105
-
Silicon physical random functions
-
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM conference on Computer and Communications Security (2002).
-
(2002)
ACM conference on Computer and Communications Security
-
-
Gassend, B.1
Clarke, D.2
van Dijk, M.3
Devadas, S.4
-
9
-
-
33750726983
-
Read-proof hardware from protective coatings
-
LNCS. Springer, Berlin
-
Tuyls, P., Schrijen, G. J., Skoric, B., van Geloven, J., Verhaegh, N., Wolters, R: Read-proof hardware from protective coatings. In: Cryprographic Hardware and Embedded Systems Workshop. LNCS, vol. 4249, pp. 369-383. Springer, Berlin (2006).
-
(2006)
Cryprographic Hardware and Embedded Systems Workshop
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.J.2
Skoric, B.3
van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
10
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Lim, D., Lee, J. W., Gassend, B., Suh, G. E., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 13(10), 1200-1205 (2005).
-
(2005)
IEEE Trans. Very Large Scale Integr. (VLSI) Syst.
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
van Dijk, M.5
Devadas, S.6
-
11
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
Digest of Technical Papers
-
Lee, J. W., Lim, D., Gassend, B., Suh, G. E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: VLSI Circuits. Digest of Technical Papers, pp. 176-179 (2004).
-
(2004)
VLSI Circuits
, pp. 176-179
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
van Dijk, M.5
Devadas, S.6
-
12
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
LNCS
-
Guajardo, J., Kumar, S. S., Schrijen, G. J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES). LNCS, vol. 4727, pp. 63-80 (2007).
-
(2007)
Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
13
-
-
70449682155
-
Fiberfingerprint identification
-
Metois, E., Yarin, P., Salzman, N., Smit, J. R.: Fiberfingerprint identification. In: Workshop on Automatic Identification, pp. 147-154 (2002).
-
(2002)
Workshop on Automatic Identification
, pp. 147-154
-
-
Metois, E.1
Yarin, P.2
Salzman, N.3
Smit, J.R.4
-
14
-
-
44049108637
-
Fingerprinting documents and packaging
-
Buchanan, J. D. R., Cowburn, R. P., Jausovec, A. V., Petit, D., Seem, P., Xiong, G., Atkinson, D., Fenton, K., Allwood, D. A., Bryan, M. T.: Fingerprinting documents and packaging. Nature 475 (2005).
-
(2005)
Nature
, vol.475
-
-
Buchanan, J.D.R.1
Cowburn, R.P.2
Jausovec, A.V.3
Petit, D.4
Seem, P.5
Xiong, G.6
Atkinson, D.7
Fenton, K.8
Allwood, D.A.9
Bryan, M.T.10
-
15
-
-
70449640056
-
Fingerprinting blank paper using commodity scanners
-
Clarkson, W., Weyrich, T., Finkelstein, A., Heninger, N., Halderman, J. A., Felten, E. W.: Fingerprinting blank paper using commodity scanners. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pp. 301-314 (2009).
-
(2009)
Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
, pp. 301-314
-
-
Clarkson, W.1
Weyrich, T.2
Finkelstein, A.3
Heninger, N.4
Halderman, J.A.5
Felten, E.W.6
-
16
-
-
80755187825
-
Paperspeckle: microscopic fingerprinting of paper
-
ACM, New York
-
Sharma, A., Subramanian, L., Brewer, E. A.: Paperspeckle: microscopic fingerprinting of paper. In: Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp. 99-110. ACM, New York (2011).
-
(2011)
Proceedings of the 18th ACM conference on Computer and communications security, CCS '11
, pp. 99-110
-
-
Sharma, A.1
Subramanian, L.2
Brewer, E.A.3
-
17
-
-
84866689983
-
Random profiles of laser marks
-
Shariati, S., Standaert, F.-X., Jacques, L., Macq, B., Salhi, M. A., Antoine, P.: Random profiles of laser marks. In: WIC Symposium on Information Theory in the Benelux, pp. 27-34 (2010).
-
(2010)
WIC Symposium on Information Theory in the Benelux
, pp. 27-34
-
-
Shariati, S.1
Standaert, F.-X.2
Jacques, L.3
Macq, B.4
Salhi, M.A.5
Antoine, P.6
-
19
-
-
85016215043
-
Physically unclonable functions: a study on the state of the art and future research directions
-
Springer, Berlin
-
Maes, R., Verbauwhede, I.: Physically unclonable functions: a study on the state of the art and future research directions. In: Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp. 3-37. Springer, Berlin (2010).
-
(2010)
Towards Hardware-Intrinsic Security, Information Security and Cryptography
, pp. 3-37
-
-
Maes, R.1
Verbauwhede, I.2
-
20
-
-
76649124351
-
Strong authentication with physical unclonable functions
-
Tuyls, P., Škorić, B.: Strong authentication with physical unclonable functions. In: Security, Privacy, and Trust in Modern Data Management, pp. 133-148 (2007).
-
(2007)
Security, Privacy, and Trust in Modern Data Management
, pp. 133-148
-
-
Tuyls, P.1
Škorić, B.2
-
22
-
-
33745654539
-
RFID-tags for anti-counterfeiting
-
LNCS, Springer, Berlin
-
Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Topics in Cryptology-CT-RSA 2006. LNCS, vol. 3860, pp. 115-131. Springer, Berlin (2006).
-
(2006)
Topics in Cryptology-CT-RSA 2006
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
23
-
-
77957133407
-
How to strongly link data and its medium: the paper case
-
Bulens, P., Standaert, F.-X., Quisquater, J.-J.: How to strongly link data and its medium: the paper case. IET Inf. Secur. 4(2), 125-136 (2010).
-
(2010)
IET Inf. Secur.
, vol.4
, Issue.2
, pp. 125-136
-
-
Bulens, P.1
Standaert, F.-X.2
Quisquater, J.-J.3
-
25
-
-
84887213366
-
Security analysis of image-based PUFs for anti-counterfeiting
-
Springer, Berlin
-
Shariati, S., Koeune, F., Standaert, F.-X.: Security analysis of image-based PUFs for anti-counterfeiting. In: Communications and Multimedia Security, pp. 27-34. Springer, Berlin (2012).
-
(2012)
Communications and Multimedia Security
, pp. 27-34
-
-
Shariati, S.1
Koeune, F.2
Standaert, F.-X.3
-
26
-
-
26444544536
-
Robust key extraction from physical uncloneable functions
-
Skoric, B., Tuyls, P., Ophey, W.: Robust key extraction from physical uncloneable functions. In: Applied Cryptography and Network Security (ACNS), pp. 407-422 (2005).
-
(2005)
Applied Cryptography and Network Security (ACNS)
, pp. 407-422
-
-
Skoric, B.1
Tuyls, P.2
Ophey, W.3
-
27
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Lim, D., Lee, J. W., Gassend, B., Edward Suh, G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13(10), 1200-1205 (2005).
-
(2005)
IEEE Trans. VLSI Syst.
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Edward Suh, G.4
van Dijk, M.5
Devadas, S.6
-
28
-
-
72449124251
-
Memory leakage-resilient encryption based on physically unclonable functions
-
LNCS
-
Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., Tuyls, P.: Memory leakage-resilient encryption based on physically unclonable functions. In Advances in Cryptology (ASIACRYPT). LNCS, vol. 5912, pp. 685-702 (2009).
-
(2009)
Advances in Cryptology (ASIACRYPT)
, vol.5912
, pp. 685-702
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.-R.3
Sunar, B.4
Tuyls, P.5
-
29
-
-
4344612730
-
Print signatures for document authentication
-
Baoshi, Z., Jiankang, W., Kankanhalli, M. S.: Print signatures for document authentication. In: ACM Conference on Computer and Communications Security, pp. 145-153 (2003).
-
(2003)
ACM Conference on Computer and Communications Security
, pp. 145-153
-
-
Baoshi, Z.1
Jiankang, W.2
Kankanhalli, M.S.3
-
31
-
-
57349155782
-
Certifying authenticity via fiber-infused paper
-
April
-
Chen, Y., Mihçak, K., Kirovski, D.: Certifying authenticity via fiber-infused paper. SIGecom Exch. 5, 29-37 (April 2005).
-
(2005)
SIGecom Exch.
, vol.5
, pp. 29-37
-
-
Chen, Y.1
Mihçak, K.2
Kirovski, D.3
-
33
-
-
42949086452
-
Secure surface identification codes
-
Beekhof, F., Voloshynovskiy, S., Koval, O., Villán, R.: Secure surface identification codes. In: Steganography, and Watermarking of Multimedia Contents X. Proceedings of SPIE, vol. 6819 (2008).
-
(2008)
Steganography, and Watermarking of Multimedia Contents X. Proceedings of SPIE
, vol.6819
-
-
Beekhof, F.1
Voloshynovskiy, S.2
Koval, O.3
Villán, R.4
-
35
-
-
78651087085
-
Randomly driven fuzzy key extraction of uncloneable images
-
Shariati, S., Jacques, L., Standaert, F.-X., Macq, B., Salhi, M. A., Antoine, P.: Randomly driven fuzzy key extraction of uncloneable images. In: International Conference on Image Processing (ICIP) (2010).
-
(2010)
International Conference on Image Processing (ICIP)
-
-
Shariati, S.1
Jacques, L.2
Standaert, F.-X.3
Macq, B.4
Salhi, M.A.5
Antoine, P.6
-
37
-
-
35048865463
-
Fuzzy extractors: How to generate strong secret keys from biometrics and other noisy data
-
Dodis, Y., et al.: Fuzzy extractors: How to generate strong secret keys from biometrics and other noisy data. In: Eurocrypt'04, pp. 523-540 (2004).
-
(2004)
Eurocrypt'04
, pp. 523-540
-
-
Dodis, Y.1
-
39
-
-
80051474783
-
A panorama on multiscale geometric representations, intertwining spatial, directional and frequency selectivity
-
Jacques, L., Duval, L., Chaux, C., Peyré, G.: A panorama on multiscale geometric representations, intertwining spatial, directional and frequency selectivity. Signal Process. 91, 2699-2730 (2011).
-
(2011)
Signal Process
, vol.91
, pp. 2699-2730
-
-
Jacques, L.1
Duval, L.2
Chaux, C.3
Peyré, G.4
-
40
-
-
34548856255
-
Theory and implementation of an analog-to-information converter using random demodulation
-
Laska, J. N., Kirolos, S., Duarte, M. F., Ragheb, T., Baraniuk, R. G., Massoud, Y.: Theory and implementation of an analog-to-information converter using random demodulation. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1959-1962 (2007).
-
(2007)
Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS)
, pp. 1959-1962
-
-
Laska, J.N.1
Kirolos, S.2
Duarte, M.F.3
Ragheb, T.4
Baraniuk, R.G.5
Massoud, Y.6
-
41
-
-
33744726904
-
Quantitative robust uncertainty principles and optimally sparse decompositions
-
April
-
Candes, E. J., Romberg, J.: Quantitative robust uncertainty principles and optimally sparse decompositions. Found. Comput. Math. 6, 227-254 (April 2006).
-
(2006)
Found. Comput. Math.
, vol.6
, pp. 227-254
-
-
Candes, E.J.1
Romberg, J.2
-
45
-
-
55649115527
-
A simple proof of the restricted isometry property for random matrices
-
Baraniuk, R., Davenport, M., DeVore, R., Wakin, M.: A simple proof of the restricted isometry property for random matrices. Constr. Approx. 28, 253-263 (2008).
-
(2008)
Constr. Approx.
, vol.28
, pp. 253-263
-
-
Baraniuk, R.1
Davenport, M.2
DeVore, R.3
Wakin, M.4
-
46
-
-
84893574327
-
Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming
-
Goemans, M., Williamson, D.: Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming. ACM 42, 1145 (1995).
-
(1995)
Acm
, vol.42
, pp. 1145
-
-
Goemans, M.1
Williamson, D.2
-
47
-
-
84856403365
-
Robust 1-bit compressive sensing via binary stable embeddings of sparse vectors
-
Jacques, L., Laska, J. N., Boufounos, P. T., Baraniuk, R. G.: Robust 1-bit compressive sensing via binary stable embeddings of sparse vectors. ArXiv e-prints (2011).
-
(2011)
ArXiv e-prints
-
-
Jacques, L.1
Laska, J.N.2
Boufounos, P.T.3
Baraniuk, R.G.4
-
48
-
-
85032752277
-
Single-pixel imaging via compressive sampling
-
Duarte, M. F., Davenport, M. A., Takhar, D., Laska, J. N., Sun, T., Kelly, K. F., Baraniuk, R. G.: Single-pixel imaging via compressive sampling. IEEE Signal Proc. Mag 25, 83-91 (2008).
-
(2008)
IEEE Signal Proc. Mag
, vol.25
, pp. 83-91
-
-
Duarte, M.F.1
Davenport, M.A.2
Takhar, D.3
Laska, J.N.4
Sun, T.5
Kelly, K.F.6
Baraniuk, R.G.7
-
49
-
-
0029938380
-
Emergence of simple-cell receptive field properties by learning a sparse code for natural images
-
Olshausen, B. A., Field, D. J.: Emergence of simple-cell receptive field properties by learning a sparse code for natural images. Nature 381, 607-609 (1996).
-
(1996)
Nature
, vol.381
, pp. 607-609
-
-
Olshausen, B.A.1
Field, D.J.2
-
53
-
-
0027576716
-
Morphological grayscale reconstruction in image analysis: applications and efficient algorithms
-
Vincent, L.: Morphological grayscale reconstruction in image analysis: applications and efficient algorithms. IEEE Trans. Image Process. 2, 176-201 (1993).
-
(1993)
IEEE Trans. Image Process.
, vol.2
, pp. 176-201
-
-
Vincent, L.1
-
54
-
-
70349226749
-
Compressive sampling of pulse trains: spread the spectrum!
-
Naini, F. M., Gribonval, R., Jacques, L., Vandergheynst, P.: Compressive sampling of pulse trains: spread the spectrum! In: IEEE International Conference on Acoustics Speech Signal Processing, pp. 2877-2880 (2009).
-
(2009)
IEEE International Conference on Acoustics Speech Signal Processing
, pp. 2877-2880
-
-
Naini, F.M.1
Gribonval, R.2
Jacques, L.3
Vandergheynst, P.4
-
55
-
-
84860754053
-
-
CoRR, abs/1110. 5870
-
Puy, G., Vandergheynst, P., Gribonval, R., Wiaux, Y.: Universal and efficient compressed sensing by spread spectrum and application to realistic fourier imaging techniques. CoRR, abs/1110. 5870 (2011).
-
(2011)
Universal and efficient compressed sensing by spread spectrum and application to realistic fourier imaging techniques
-
-
Puy, G.1
Vandergheynst, P.2
Gribonval, R.3
Wiaux, Y.4
-
56
-
-
0018734781
-
SCOTT. On optimal and data-based histograms
-
David, W.: SCOTT. On optimal and data-based histograms. Biometrika 66(3), 605-610 (1979).
-
(1979)
Biometrika
, vol.66
, Issue.3
, pp. 605-610
-
-
David, W.1
-
57
-
-
33644816032
-
Performance evaluation of fingerprint verification systems
-
Cappelli, Raffaele, Maio, Dario, Maltoni, Davide, Wayman, James L., Jain, Anil K.: Performance evaluation of fingerprint verification systems. IEEE Trans. Pattern Anal. Mach. Intell. 28, 3-18 (2006).
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.28
, pp. 3-18
-
-
Cappelli, R.1
Maio, D.2
Maltoni, D.3
Wayman James, L.4
Jain Anil, K.5
|