메뉴 건너뛰기




Volumn , Issue , 2013, Pages 43-54

Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes

Author keywords

convolutional code; differential sequence coding (dsc); error correction; fuzzy extractor; physical unclonable functions (pufs); syndrome coding; viterbi decoder

Indexed keywords

FUZZY EXTRACTORS; PHYSICAL UNCLONABLE FUNCTIONS; SEQUENCE CODING; SYNDROME CODING; VITERBI DECODER;

EID: 84889009632     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2517300.2517304     Document Type: Conference Paper
Times cited : (35)

References (47)
  • 1
    • 68949175522 scopus 로고    scopus 로고
    • Power-up SRAM state as an identifying fingerprint and source of true random numbers
    • D. E. Holcomb, W. P. Burleson, and K. Fu, "Power-up SRAM state as an identifying fingerprint and source of true random numbers," IEEE Transactions on Computers, vol. 58, no. 9, pp. 1198-1210, 2009.
    • (2009) IEEE Transactions on Computers , vol.58 , Issue.9 , pp. 1198-1210
    • Holcomb, D.E.1    Burleson, W.P.2    Fu, K.3
  • 4
    • 38049015807 scopus 로고    scopus 로고
    • FPGA intrinsic PUFs and their use for IP protection
    • Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. P. Paillier and I. Verbauwhede, Eds., Springer, Heidelberg
    • J. Guajardo, S. S. Kumar, G. J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, P. Paillier and I. Verbauwhede, Eds., vol. 4727. Springer, Heidelberg, 2007, pp. 63-80.
    • (2007) LNCS , vol.4727 , pp. 63-80
    • Guajardo, J.1    Kumar, S.S.2    Schrijen, G.J.3    Tuyls, P.4
  • 12
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Advances in Cryptology (EUROCRYPT), ser. C. Cachin and J. L. Camenisch, Eds., Springer, Heidelberg
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology (EUROCRYPT), ser. LNCS, C. Cachin and J. L. Camenisch, Eds., vol. 3027. Springer, Heidelberg, 2004, pp. 523-540.
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 13
    • 76949095784 scopus 로고    scopus 로고
    • Secure and robust error correction for physical unclonable functions
    • M.-D. Yu and S. Devadas, "Secure and robust error correction for physical unclonable functions," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 48-65, 2010.
    • (2010) IEEE Design & Test of Computers , vol.27 , Issue.1 , pp. 48-65
    • Yu, M.-D.1    Devadas, S.2
  • 15
    • 51049117293 scopus 로고    scopus 로고
    • Efficient helper data key extractor on FPGAs
    • Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. E. Oswald and P. Rohatgi, Eds., 5154. Springer, Heidelberg
    • C. Bösch, J. Guajardo, A.-R. Sadeghi, J. Shokrollahi, and P. Tuyls, "Efficient helper data key extractor on FPGAs," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, E. Oswald and P. Rohatgi, Eds., vol. 5154. Springer, Heidelberg, 2008, pp. 181-197.
    • (2008) LNCS , pp. 181-197
    • Bösch, C.1    Guajardo, J.2    Sadeghi, A.-R.3    Shokrollahi, J.4    Tuyls, P.5
  • 17
    • 70350614531 scopus 로고    scopus 로고
    • Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs
    • C. Clavier and K. Gaj, Eds. Springer, Heidelberg
    • -, "Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), C. Clavier and K. Gaj, Eds. Springer, Heidelberg, 2009, pp. 332-347.
    • (2009) Workshop on Cryptographic Hardware and Embedded Systems (CHES) , pp. 332-347
    • Maes, R.1    Tuyls, P.2    Verbauwhede, I.3
  • 19
    • 84866726878 scopus 로고    scopus 로고
    • PUFKY: A fully functional PUF-based cryptographic key generator
    • Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. E. Prouff and P. Schaumont, Eds., Springer, Heidelberg
    • R. Maes, A. Van Herrewege, and I. Verbauwhede, "PUFKY: A fully functional PUF-based cryptographic key generator," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, E. Prouff and P. Schaumont, Eds., vol. 7428. Springer, Heidelberg, 2012, pp. 302-319.
    • (2012) LNCS , vol.7428 , pp. 302-319
    • Maes, R.1    Van Herrewege, A.2    Verbauwhede, I.3
  • 20
    • 84866653410 scopus 로고    scopus 로고
    • Soft decision error correction for compact memory-based PUFs using a single enrollment
    • Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. E. Prouff and P. Schaumont, Eds., Springer, Heidelberg
    • V. van der Leest, B. Preneel, and E. van der Sluis, "Soft decision error correction for compact memory-based PUFs using a single enrollment," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, E. Prouff and P. Schaumont, Eds., vol. 7428. Springer, Heidelberg, 2012, pp. 268-282.
    • (2012) LNCS , vol.7428 , pp. 268-282
    • Van Der Leest, V.1    Preneel, B.2    Van Der Sluis, E.3
  • 22
    • 64149093297 scopus 로고    scopus 로고
    • Channel coding: The road to channel capacity
    • D. J. Costello Jr. and G. D. Forney Jr., "Channel coding: The road to channel capacity," Proceedings of the IEEE, vol. 95, pp. 1150-1177, 2007.
    • (2007) Proceedings of the IEEE , vol.95 , pp. 1150-1177
    • Costello Jr., D.J.1    Forney Jr., G.D.2
  • 23
    • 84935113569 scopus 로고
    • Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
    • A. J. Viterbi, "Error bounds for convolutional codes and an asymptotically optimum decoding algorithm," IEEE Transactions on Information Theory, vol. 13, no. 2, pp. 260-269, 1967.
    • (1967) IEEE Transactions on Information Theory , vol.13 , Issue.2 , pp. 260-269
    • Viterbi, A.J.1
  • 27
    • 0029229981 scopus 로고
    • Soft-decision decoding of Reed-Muller codes as generalized multiple concatenated codes
    • G. Schnabl and M. Bossert, "Soft-decision decoding of Reed-Muller codes as generalized multiple concatenated codes," IEEE Transactions on Information Theory., vol. 41, no. 1, pp. 304-308, 1995.
    • (1995) IEEE Transactions on Information Theory , vol.41 , Issue.1 , pp. 304-308
    • Schnabl, G.1    Bossert, M.2
  • 29
    • 84930503457 scopus 로고    scopus 로고
    • Security and reliability properties of syndrome coding techniques used in puf key generation
    • M.-D. Yu, D. M'Raihi, S. Devadas, and I. Verbauwhede, "Security and reliability properties of syndrome coding techniques used in puf key generation," in GOMACTech Conference, 2013, pp. 1-4.
    • GOMACTech Conference, 2013 , pp. 1-4
    • Yu, M.-D.1    M'Raihi, D.2    Devadas, S.3    Verbauwhede, I.4
  • 31
    • 84865824388 scopus 로고    scopus 로고
    • Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs
    • Financial Cryptography and Data Security (FC), ser. A. D. Keromytis, Ed., Springer, Heidelberg
    • A. van Herrewege, S. Katzenbeisser, R. Maes, R. Peeters, A.-R. Sadeghi, I. Verbauwhede, and C. Wachsmann, "Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs," in Financial Cryptography and Data Security (FC), ser. LNCS, A. D. Keromytis, Ed., vol. 7397. Springer, Heidelberg, 2012, pp. 374-389.
    • (2012) LNCS , vol.7397 , pp. 374-389
    • Van Herrewege, A.1    Katzenbeisser, S.2    Maes, R.3    Peeters, R.4    Sadeghi, A.-R.5    Verbauwhede, I.6    Wachsmann, C.7
  • 33
    • 37149045263 scopus 로고    scopus 로고
    • PRESENT: An ultra-lightweight block cipher
    • Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. P. Paillier and I. Verbauwhede, Eds., Springer, Heidelberg
    • A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe, "PRESENT: An ultra-lightweight block cipher," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, P. Paillier and I. Verbauwhede, Eds., vol. 4727. Springer, Heidelberg, 2007, pp. 450-466.
    • (2007) LNCS , vol.4727 , pp. 450-466
    • Bogdanov, A.1    Knudsen, L.R.2    Leander, G.3    Paar, C.4    Poschmann, A.5    Robshaw, M.J.B.6    Seurin, Y.7    Vikkelsoe, C.8
  • 34
    • 72449124251 scopus 로고    scopus 로고
    • Memory leakage-resilient encryption based on physically unclonable functions
    • Advances in Cryptology (ASIACRYPT), ser. M. Matsui, Ed., Springer Berlin Heidelberg
    • F. Armknecht, R. Maes, A.-R. Sadeghi, B. Sunar, and P. Tuyls, "Memory leakage-resilient encryption based on physically unclonable functions," in Advances in Cryptology (ASIACRYPT), ser. LNCS, M. Matsui, Ed., vol. 5912. Springer Berlin Heidelberg, 2009, pp. 685-702.
    • (2009) LNCS , vol.5912 , pp. 685-702
    • Armknecht, F.1    Maes, R.2    Sadeghi, A.-R.3    Sunar, B.4    Tuyls, P.5
  • 36
    • 78049326367 scopus 로고    scopus 로고
    • An alternative to error correction for SRAM-like PUFs
    • Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. S. Mangard and F.-X. Standaert, Eds., Springer, Heidelberg
    • M. Hofer and C. Boehm, "An alternative to error correction for SRAM-like PUFs," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, S. Mangard and F.-X. Standaert, Eds., vol. 6225. Springer, Heidelberg, 2010, pp. 335-350.
    • (2010) LNCS , vol.6225 , pp. 335-350
    • Hofer, M.1    Boehm, C.2
  • 38
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in ACM/IEEE Design Automation Conference (DAC), 2007, pp. 9-14.
    • ACM/IEEE Design Automation Conference (DAC), 2007 , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 39
    • 84889009144 scopus 로고    scopus 로고
    • An accurate probabilistic reliability model for silicon PUFs
    • Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. G. Bertoni and J.-S. Coron, Eds. Springer, Heidelberg
    • R. Maes, "An accurate probabilistic reliability model for silicon PUFs," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, G. Bertoni and J.-S. Coron, Eds. Springer, Heidelberg, 2013, pp. 73-89.
    • (2013) LNCS , pp. 73-89
    • Maes, R.1
  • 41
    • 84866642869 scopus 로고    scopus 로고
    • PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
    • Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. E. Prouff and P. Schaumont, Eds., Springer, Heidelberg
    • S. Katzenbeisser, U. Kocabas, V. Rozic, A.-R. Sadeghi, I. Verbauwhede, and C. Wachsmann, "PUFs: Myth, fact or busted? a security evaluation of physically unclonable functions (PUFs) cast in silicon," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, E. Prouff and P. Schaumont, Eds., vol. 7428. Springer, Heidelberg, 2012, pp. 283-301.
    • (2012) LNCS , vol.7428 , pp. 283-301
    • Katzenbeisser, S.1    Kocabas, U.2    Rozic, V.3    Sadeghi, A.-R.4    Verbauwhede, I.5    Wachsmann, C.6
  • 42
    • 85037371734 scopus 로고    scopus 로고
    • Side-channel analysis of PUFs and fuzzy extractors
    • International Conference on Trust and Trustworthy Computing (TRUST), ser. J. M. McCune, B. Balacheff, A. Perrig, A.-R. Sadeghi, A. Sasse, and Y. Beres, Eds., Springer
    • D. Merli, D. Schuster, F. Stumpf, and G. Sigl, "Side-channel analysis of PUFs and fuzzy extractors," in International Conference on Trust and Trustworthy Computing (TRUST), ser. LNCS, J. M. McCune, B. Balacheff, A. Perrig, A.-R. Sadeghi, A. Sasse, and Y. Beres, Eds., vol. 6740. Springer, 2011, pp. 33-47.
    • (2011) LNCS , vol.6740 , pp. 33-47
    • Merli, D.1    Schuster, D.2    Stumpf, F.3    Sigl, G.4
  • 43
    • 24944501364 scopus 로고    scopus 로고
    • Secure remote authentication using biometric data
    • Advances in Cryptology (EUROCRYPT), ser. R. Cramer, Ed., Springer, Heidelberg
    • X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith, "Secure remote authentication using biometric data," in Advances in Cryptology (EUROCRYPT), ser. LNCS, R. Cramer, Ed., vol. 3494. Springer, Heidelberg, 2005, pp. 147-163.
    • (2005) LNCS , vol.3494 , pp. 147-163
    • Boyen, X.1    Dodis, Y.2    Katz, J.3    Ostrovsky, R.4    Smith, A.5
  • 44
    • 44449149774 scopus 로고    scopus 로고
    • Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
    • Advances in Cryptology (EUROCRYPT), ser. N. Smart, Ed., Springer, Heidelberg
    • R. Cramer, Y. Dodis, S. Fehr, C. Padro, and D. Wichs, "Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors," in Advances in Cryptology (EUROCRYPT), ser. LNCS, N. Smart, Ed., vol. 4965. Springer, Heidelberg, 2008, pp. 471-488.
    • (2008) LNCS , vol.4965 , pp. 471-488
    • Cramer, R.1    Dodis, Y.2    Fehr, S.3    Padro, C.4    Wichs, D.5
  • 45
    • 0021497353 scopus 로고
    • The weight spectra of some short low-rate convolutional codes
    • J. Conan, "The weight spectra of some short low-rate convolutional codes," IEEE Transactions on Communications, vol. 32, no. 9, pp. 1050-1053, 1984.
    • (1984) IEEE Transactions on Communications , vol.32 , Issue.9 , pp. 1050-1053
    • Conan, J.1
  • 46
  • 47
    • 80053502266 scopus 로고    scopus 로고
    • SPONGENT: A lightweight hash function
    • Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. B. Preneel and T. Takagi, Eds., Springer, Heidelberg
    • A. Bogdanov, M. Knezevic, G. Leander, D. Toz, K. Varici, and I. Verbauwhede, "SPONGENT: A lightweight hash function," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, B. Preneel and T. Takagi, Eds., vol. 6917. Springer, Heidelberg, 2011, pp. 312-325.
    • (2011) LNCS , vol.6917 , pp. 312-325
    • Bogdanov, A.1    Knezevic, M.2    Leander, G.3    Toz, D.4    Varici, K.5    Verbauwhede, I.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.