-
1
-
-
68949175522
-
Power-up SRAM state as an identifying fingerprint and source of true random numbers
-
D. E. Holcomb, W. P. Burleson, and K. Fu, "Power-up SRAM state as an identifying fingerprint and source of true random numbers," IEEE Transactions on Computers, vol. 58, no. 9, pp. 1198-1210, 2009.
-
(2009)
IEEE Transactions on Computers
, vol.58
, Issue.9
, pp. 1198-1210
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
2
-
-
84873964062
-
On the potential of PUF for pseudonym generation in vehicular networks
-
J. Petit, C. Bösch, M. Feiri, and F. Kargl, "On the potential of PUF for pseudonym generation in vehicular networks," in IEEE Vehicular Networking Conference (VNC), 2012, pp. 94-100.
-
IEEE Vehicular Networking Conference (VNC), 2012
, pp. 94-100
-
-
Petit, J.1
Bösch, C.2
Feiri, M.3
Kargl, F.4
-
3
-
-
70449096107
-
Reconfigurable physical unclonable functions - Enabling technology for tamper-resistant storage
-
K. Kursawe, A.-R. Sadeghi, D. Schellekens, B. Skoric, and P. Tuyls, "Reconfigurable physical unclonable functions - enabling technology for tamper-resistant storage," in IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2009, pp. 22-29.
-
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2009
, pp. 22-29
-
-
Kursawe, K.1
Sadeghi, A.-R.2
Schellekens, D.3
Skoric, B.4
Tuyls, P.5
-
4
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. P. Paillier and I. Verbauwhede, Eds., Springer, Heidelberg
-
J. Guajardo, S. S. Kumar, G. J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, P. Paillier and I. Verbauwhede, Eds., vol. 4727. Springer, Heidelberg, 2007, pp. 63-80.
-
(2007)
LNCS
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
6
-
-
84885611404
-
Anti-counterfeiting with hardware intrinsic security
-
V. van der Leest and P. Tuyls, "Anti-counterfeiting with hardware intrinsic security," in Design, Automation & Test in Europe Conference & Exhibition (DATE), 2013, pp. 1137-1142.
-
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2013
, pp. 1137-1142
-
-
Van Der Leest, V.1
Tuyls, P.2
-
7
-
-
84882967642
-
A new security architecture for smartcards utilizing PUFs
-
T. Esbach, W. Fumy, O. Kulikovska, D. Merli, D. Schuster, and F. Stumpf, "A new security architecture for smartcards utilizing PUFs," in Information Security Solutions Europe (ISSE), 2012.
-
(2012)
Information Security Solutions Europe (ISSE)
-
-
Esbach, T.1
Fumy, W.2
Kulikovska, O.3
Merli, D.4
Schuster, D.5
Stumpf, F.6
-
8
-
-
76949093125
-
Techniques for design and implementation of secure reconfigurable PUFs
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Techniques for design and implementation of secure reconfigurable PUFs," ACM Transactions on Reconfigurable Technology Systems (TRETS), vol. 2, no. 1, pp. 1-33, 2009.
-
(2009)
ACM Transactions on Reconfigurable Technology Systems (TRETS)
, vol.2
, Issue.1
, pp. 1-33
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
12
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Advances in Cryptology (EUROCRYPT), ser. C. Cachin and J. L. Camenisch, Eds., Springer, Heidelberg
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology (EUROCRYPT), ser. LNCS, C. Cachin and J. L. Camenisch, Eds., vol. 3027. Springer, Heidelberg, 2004, pp. 523-540.
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
13
-
-
76949095784
-
Secure and robust error correction for physical unclonable functions
-
M.-D. Yu and S. Devadas, "Secure and robust error correction for physical unclonable functions," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 48-65, 2010.
-
(2010)
IEEE Design & Test of Computers
, vol.27
, Issue.1
, pp. 48-65
-
-
Yu, M.-D.1
Devadas, S.2
-
15
-
-
51049117293
-
Efficient helper data key extractor on FPGAs
-
Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. E. Oswald and P. Rohatgi, Eds., 5154. Springer, Heidelberg
-
C. Bösch, J. Guajardo, A.-R. Sadeghi, J. Shokrollahi, and P. Tuyls, "Efficient helper data key extractor on FPGAs," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, E. Oswald and P. Rohatgi, Eds., vol. 5154. Springer, Heidelberg, 2008, pp. 181-197.
-
(2008)
LNCS
, pp. 181-197
-
-
Bösch, C.1
Guajardo, J.2
Sadeghi, A.-R.3
Shokrollahi, J.4
Tuyls, P.5
-
16
-
-
70449487684
-
A soft decision helper data algorithm for SRAM PUFs
-
R. Maes, P. Tuyls, and I. Verbauwhede, "A soft decision helper data algorithm for SRAM PUFs," in IEEE International Symposium on Information Theory (ISIT), 2009, pp. 2101-2105.
-
IEEE International Symposium on Information Theory (ISIT), 2009
, pp. 2101-2105
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
17
-
-
70350614531
-
Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs
-
C. Clavier and K. Gaj, Eds. Springer, Heidelberg
-
-, "Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), C. Clavier and K. Gaj, Eds. Springer, Heidelberg, 2009, pp. 332-347.
-
(2009)
Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, pp. 332-347
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
18
-
-
84864149092
-
Complementary IBS: Application specific error correction for PUFs
-
M. Hiller, D. Merli, F. Stumpf, and G. Sigl, "Complementary IBS: Application specific error correction for PUFs," in IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2012, pp. 1-6.
-
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2012
, pp. 1-6
-
-
Hiller, M.1
Merli, D.2
Stumpf, F.3
Sigl, G.4
-
19
-
-
84866726878
-
PUFKY: A fully functional PUF-based cryptographic key generator
-
Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. E. Prouff and P. Schaumont, Eds., Springer, Heidelberg
-
R. Maes, A. Van Herrewege, and I. Verbauwhede, "PUFKY: A fully functional PUF-based cryptographic key generator," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, E. Prouff and P. Schaumont, Eds., vol. 7428. Springer, Heidelberg, 2012, pp. 302-319.
-
(2012)
LNCS
, vol.7428
, pp. 302-319
-
-
Maes, R.1
Van Herrewege, A.2
Verbauwhede, I.3
-
20
-
-
84866653410
-
Soft decision error correction for compact memory-based PUFs using a single enrollment
-
Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. E. Prouff and P. Schaumont, Eds., Springer, Heidelberg
-
V. van der Leest, B. Preneel, and E. van der Sluis, "Soft decision error correction for compact memory-based PUFs using a single enrollment," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, E. Prouff and P. Schaumont, Eds., vol. 7428. Springer, Heidelberg, 2012, pp. 268-282.
-
(2012)
LNCS
, vol.7428
, pp. 268-282
-
-
Van Der Leest, V.1
Preneel, B.2
Van Der Sluis, E.3
-
21
-
-
84864153887
-
Performance metrics and empirical results of a PUF cryptographic key generation ASIC
-
M.-D. Yu, R. Sowell, A. Singh, D. M'Raihi, and S. Devadas, "Performance metrics and empirical results of a PUF cryptographic key generation ASIC," in IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2012, pp. 108-115.
-
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2012
, pp. 108-115
-
-
Yu, M.-D.1
Sowell, R.2
Singh, A.3
M'Raihi, D.4
Devadas, S.5
-
23
-
-
84935113569
-
Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
-
A. J. Viterbi, "Error bounds for convolutional codes and an asymptotically optimum decoding algorithm," IEEE Transactions on Information Theory, vol. 13, no. 2, pp. 260-269, 1967.
-
(1967)
IEEE Transactions on Information Theory
, vol.13
, Issue.2
, pp. 260-269
-
-
Viterbi, A.J.1
-
27
-
-
0029229981
-
Soft-decision decoding of Reed-Muller codes as generalized multiple concatenated codes
-
G. Schnabl and M. Bossert, "Soft-decision decoding of Reed-Muller codes as generalized multiple concatenated codes," IEEE Transactions on Information Theory., vol. 41, no. 1, pp. 304-308, 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.1
, pp. 304-308
-
-
Schnabl, G.1
Bossert, M.2
-
29
-
-
84930503457
-
Security and reliability properties of syndrome coding techniques used in puf key generation
-
M.-D. Yu, D. M'Raihi, S. Devadas, and I. Verbauwhede, "Security and reliability properties of syndrome coding techniques used in puf key generation," in GOMACTech Conference, 2013, pp. 1-4.
-
GOMACTech Conference, 2013
, pp. 1-4
-
-
Yu, M.-D.1
M'Raihi, D.2
Devadas, S.3
Verbauwhede, I.4
-
30
-
-
84864182393
-
Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching
-
M. Majzoobi, M. Rostami, F. Koushanfar, D. S. Wallach, and S. Devadas, "Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching," in International Workshop on Trustworthy Embedded Devices (TrustED), 2012, pp. 33-44.
-
International Workshop on Trustworthy Embedded Devices (TrustED), 2012
, pp. 33-44
-
-
Majzoobi, M.1
Rostami, M.2
Koushanfar, F.3
Wallach, D.S.4
Devadas, S.5
-
31
-
-
84865824388
-
Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs
-
Financial Cryptography and Data Security (FC), ser. A. D. Keromytis, Ed., Springer, Heidelberg
-
A. van Herrewege, S. Katzenbeisser, R. Maes, R. Peeters, A.-R. Sadeghi, I. Verbauwhede, and C. Wachsmann, "Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs," in Financial Cryptography and Data Security (FC), ser. LNCS, A. D. Keromytis, Ed., vol. 7397. Springer, Heidelberg, 2012, pp. 374-389.
-
(2012)
LNCS
, vol.7397
, pp. 374-389
-
-
Van Herrewege, A.1
Katzenbeisser, S.2
Maes, R.3
Peeters, R.4
Sadeghi, A.-R.5
Verbauwhede, I.6
Wachsmann, C.7
-
33
-
-
37149045263
-
PRESENT: An ultra-lightweight block cipher
-
Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. P. Paillier and I. Verbauwhede, Eds., Springer, Heidelberg
-
A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe, "PRESENT: An ultra-lightweight block cipher," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, P. Paillier and I. Verbauwhede, Eds., vol. 4727. Springer, Heidelberg, 2007, pp. 450-466.
-
(2007)
LNCS
, vol.4727
, pp. 450-466
-
-
Bogdanov, A.1
Knudsen, L.R.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.J.B.6
Seurin, Y.7
Vikkelsoe, C.8
-
34
-
-
72449124251
-
Memory leakage-resilient encryption based on physically unclonable functions
-
Advances in Cryptology (ASIACRYPT), ser. M. Matsui, Ed., Springer Berlin Heidelberg
-
F. Armknecht, R. Maes, A.-R. Sadeghi, B. Sunar, and P. Tuyls, "Memory leakage-resilient encryption based on physically unclonable functions," in Advances in Cryptology (ASIACRYPT), ser. LNCS, M. Matsui, Ed., vol. 5912. Springer Berlin Heidelberg, 2009, pp. 685-702.
-
(2009)
LNCS
, vol.5912
, pp. 685-702
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.-R.3
Sunar, B.4
Tuyls, P.5
-
36
-
-
78049326367
-
An alternative to error correction for SRAM-like PUFs
-
Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. S. Mangard and F.-X. Standaert, Eds., Springer, Heidelberg
-
M. Hofer and C. Boehm, "An alternative to error correction for SRAM-like PUFs," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, S. Mangard and F.-X. Standaert, Eds., vol. 6225. Springer, Heidelberg, 2010, pp. 335-350.
-
(2010)
LNCS
, vol.6225
, pp. 335-350
-
-
Hofer, M.1
Boehm, C.2
-
37
-
-
84888987221
-
DRV-fingerprinting: Using data retention voltage of SRAM cells for chip identification
-
D. Holcomb, A. Rahmati, M. Salajegheh, W. P. Burleson, and K. Fu, "DRV-fingerprinting: Using data retention voltage of SRAM cells for chip identification," in Workshop on RFID Security and Privacy (RFIDSec), 2012.
-
Workshop on RFID Security and Privacy (RFIDSec), 2012
-
-
Holcomb, D.1
Rahmati, A.2
Salajegheh, M.3
Burleson, W.P.4
Fu, K.5
-
39
-
-
84889009144
-
An accurate probabilistic reliability model for silicon PUFs
-
Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. G. Bertoni and J.-S. Coron, Eds. Springer, Heidelberg
-
R. Maes, "An accurate probabilistic reliability model for silicon PUFs," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, G. Bertoni and J.-S. Coron, Eds. Springer, Heidelberg, 2013, pp. 73-89.
-
(2013)
LNCS
, pp. 73-89
-
-
Maes, R.1
-
41
-
-
84866642869
-
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
-
Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. E. Prouff and P. Schaumont, Eds., Springer, Heidelberg
-
S. Katzenbeisser, U. Kocabas, V. Rozic, A.-R. Sadeghi, I. Verbauwhede, and C. Wachsmann, "PUFs: Myth, fact or busted? a security evaluation of physically unclonable functions (PUFs) cast in silicon," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, E. Prouff and P. Schaumont, Eds., vol. 7428. Springer, Heidelberg, 2012, pp. 283-301.
-
(2012)
LNCS
, vol.7428
, pp. 283-301
-
-
Katzenbeisser, S.1
Kocabas, U.2
Rozic, V.3
Sadeghi, A.-R.4
Verbauwhede, I.5
Wachsmann, C.6
-
42
-
-
85037371734
-
Side-channel analysis of PUFs and fuzzy extractors
-
International Conference on Trust and Trustworthy Computing (TRUST), ser. J. M. McCune, B. Balacheff, A. Perrig, A.-R. Sadeghi, A. Sasse, and Y. Beres, Eds., Springer
-
D. Merli, D. Schuster, F. Stumpf, and G. Sigl, "Side-channel analysis of PUFs and fuzzy extractors," in International Conference on Trust and Trustworthy Computing (TRUST), ser. LNCS, J. M. McCune, B. Balacheff, A. Perrig, A.-R. Sadeghi, A. Sasse, and Y. Beres, Eds., vol. 6740. Springer, 2011, pp. 33-47.
-
(2011)
LNCS
, vol.6740
, pp. 33-47
-
-
Merli, D.1
Schuster, D.2
Stumpf, F.3
Sigl, G.4
-
43
-
-
24944501364
-
Secure remote authentication using biometric data
-
Advances in Cryptology (EUROCRYPT), ser. R. Cramer, Ed., Springer, Heidelberg
-
X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith, "Secure remote authentication using biometric data," in Advances in Cryptology (EUROCRYPT), ser. LNCS, R. Cramer, Ed., vol. 3494. Springer, Heidelberg, 2005, pp. 147-163.
-
(2005)
LNCS
, vol.3494
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
44
-
-
44449149774
-
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
-
Advances in Cryptology (EUROCRYPT), ser. N. Smart, Ed., Springer, Heidelberg
-
R. Cramer, Y. Dodis, S. Fehr, C. Padro, and D. Wichs, "Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors," in Advances in Cryptology (EUROCRYPT), ser. LNCS, N. Smart, Ed., vol. 4965. Springer, Heidelberg, 2008, pp. 471-488.
-
(2008)
LNCS
, vol.4965
, pp. 471-488
-
-
Cramer, R.1
Dodis, Y.2
Fehr, S.3
Padro, C.4
Wichs, D.5
-
45
-
-
0021497353
-
The weight spectra of some short low-rate convolutional codes
-
J. Conan, "The weight spectra of some short low-rate convolutional codes," IEEE Transactions on Communications, vol. 32, no. 9, pp. 1050-1053, 1984.
-
(1984)
IEEE Transactions on Communications
, vol.32
, Issue.9
, pp. 1050-1053
-
-
Conan, J.1
-
46
-
-
84889002201
-
-
Project Report, Massachusetts Institute of Technology
-
A. Chang, O. Salehi-Abari, and S. S. Woo, "Viterbi decoder," Project Report, Massachusetts Institute of Technology, 2011.
-
(2011)
Viterbi Decoder
-
-
Chang, A.1
Salehi-Abari, O.2
Woo, S.S.3
-
47
-
-
80053502266
-
SPONGENT: A lightweight hash function
-
Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. B. Preneel and T. Takagi, Eds., Springer, Heidelberg
-
A. Bogdanov, M. Knezevic, G. Leander, D. Toz, K. Varici, and I. Verbauwhede, "SPONGENT: A lightweight hash function," in Workshop on Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, B. Preneel and T. Takagi, Eds., vol. 6917. Springer, Heidelberg, 2011, pp. 312-325.
-
(2011)
LNCS
, vol.6917
, pp. 312-325
-
-
Bogdanov, A.1
Knezevic, M.2
Leander, G.3
Toz, D.4
Varici, K.5
Verbauwhede, I.6
|