-
1
-
-
24944501364
-
Secure remote authentication using biometric data
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure Remote Authentication Using Biometric Data. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147-163. Springer, Heidelberg (2005) (Pubitemid 41313951)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
2
-
-
52149117439
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM J. Comput. 38(1), 97-139 (2008)
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
3
-
-
84874047126
-
Machine Learning Attacks on 65nm Arbiter PUFs: Accurate Modeling poses strict Bounds on Usability
-
IEEE December
-
Hospodar, G., Maes, R., Verbauwhede, I.: Machine Learning Attacks on 65nm Arbiter PUFs: Accurate Modeling poses strict Bounds on Usability. In: Workshop on Information Forensics and Security (WIFS), pp. 37-42. IEEE (December 2012)
-
(2012)
Workshop on Information Forensics and Security (WIFS)
, pp. 37-42
-
-
Hospodar, G.1
Maes, R.2
Verbauwhede, I.3
-
4
-
-
84870784876
-
Experimental Evaluation of Physically Unclonable Functions in 65 nmCMOS
-
September
-
Koeberl, P., Maes, R., Rožić, V., Van der Leest, V., Van der Sluis, E., Verbauwhede, I.: Experimental Evaluation of Physically Unclonable Functions in 65 nmCMOS. In: 2012 IEEE Conference on European Solid-State Circuits (ESSCIRC), pp. 486-489 (September 2012)
-
(2012)
2012 IEEE Conference on European Solid-State Circuits (ESSCIRC)
, pp. 486-489
-
-
Koeberl, P.1
Maes, R.2
Rožić, V.3
Van Der Leest, V.4
Van Der Sluis, E.5
Verbauwhede, I.6
-
5
-
-
85131490867
-
Noise in Semiconductor Devices
-
ch. 11. CRC Press
-
Konczakowska, A., Wilamowski, B.M.: Noise in Semiconductor Devices. In: Industrial Electronics Handbook, 2nd edn. Fundamentals of Industrial Electronics, vol. 1, ch. 11. CRC Press (2011)
-
(2011)
Industrial Electronics Handbook, 2nd Edn. Fundamentals of Industrial Electronics
, vol.1
-
-
Konczakowska, A.1
Wilamowski, B.M.2
-
6
-
-
66649124356
-
Managing Process Variation in Intel's 45nm CMOS Technology
-
Kuhn, K., Kenyon, C., Kornfeld, A., Liu, M., Maheshwari, A., Shih, W., Sivakumar, S., Taylor, G., Van Der Voorn, P., Zawadzki, K.: Managing Process Variation in Intel's 45nm CMOS Technology. Intel Technology Journal 12(2), 92-110 (2008)
-
(2008)
Intel Technology Journal
, vol.12
, Issue.2
, pp. 92-110
-
-
Kuhn, K.1
Kenyon, C.2
Kornfeld, A.3
Liu, M.4
Maheshwari, A.5
Shih, W.6
Sivakumar, S.7
Taylor, G.8
Van Der Voorn, P.9
Zawadzki, K.10
-
7
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
June
-
Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: 2004 Symposium on VLSI Circuits, pp. 176-179 (June 2004)
-
(2004)
2004 Symposium on VLSI Circuits
, pp. 176-179
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
8
-
-
85037371734
-
Side-channel analysis of PUFs and fuzzy extractors
-
McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) TRUST 2011 Springer, Heidelberg
-
Merli, D., Schuster, D., Stumpf, F., Sigl, G.: Side-channel analysis of PUFs and fuzzy extractors. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) TRUST 2011. LNCS, vol. 6740, pp. 33-47. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6740
, pp. 33-47
-
-
Merli, D.1
Schuster, D.2
Stumpf, F.3
Sigl, G.4
-
10
-
-
84901282930
-
Reliable PUF value generation by pattern matching
-
Verayo Inc.: Patent WO/2012/099657 July 26
-
Paral, Z., Devadas, S., Verayo Inc.: Patent WO/2012/099657, Reliable PUF value generation by pattern matching (July 26, 2012)
-
(2012)
-
-
Paral, Z.1
Devadas, S.2
-
11
-
-
79957692700
-
Security based on Physical Unclonability and Disorder
-
Springer, Book Chapter
-
Rührmair, U., Devadas, S., Koushanfar, F.: Security based on Physical Unclonability and Disorder. Introduction to Hardware Security and Trust. Springer, Book Chapter (2011)
-
(2011)
Introduction to Hardware Security and Trust
-
-
Rührmair, U.1
Devadas, S.2
Koushanfar, F.3
-
12
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
October
-
Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: 2010 ACM Conference on Computer and Communications Security (CCS), pp. 237-249 (October 2010)
-
(2010)
2010 ACM Conference on Computer and Communications Security (CCS)
, pp. 237-249
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
14
-
-
33750726983
-
Read-Proof Hardware from Protective Coatings
-
Goubin, L., Matsui, M. (eds.) CHES 2006 Springer, Heidelberg
-
Tuyls, P., Schrijen, G.-J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.-J.2
Škorić, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
|