메뉴 건너뛰기




Volumn 8366 LNCS, Issue , 2014, Pages 106-131

Attacking PUF-based pattern matching key generators via helper data manipulation

Author keywords

fuzzy extractor; Hamming distance; helper data; PUF; secret key

Indexed keywords

ACCESS CONTROL; CMOS INTEGRATED CIRCUITS; HAMMING DISTANCE; PATTERN MATCHING;

EID: 84901277586     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-04852-9_6     Document Type: Conference Paper
Times cited : (42)

References (14)
  • 1
    • 24944501364 scopus 로고    scopus 로고
    • Secure remote authentication using biometric data
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure Remote Authentication Using Biometric Data. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147-163. Springer, Heidelberg (2005) (Pubitemid 41313951)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 147-163
    • Boyen, X.1    Dodis, Y.2    Katz, J.3    Ostrovsky, R.4    Smith, A.5
  • 2
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM J. Comput. 38(1), 97-139 (2008)
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 3
    • 84874047126 scopus 로고    scopus 로고
    • Machine Learning Attacks on 65nm Arbiter PUFs: Accurate Modeling poses strict Bounds on Usability
    • IEEE December
    • Hospodar, G., Maes, R., Verbauwhede, I.: Machine Learning Attacks on 65nm Arbiter PUFs: Accurate Modeling poses strict Bounds on Usability. In: Workshop on Information Forensics and Security (WIFS), pp. 37-42. IEEE (December 2012)
    • (2012) Workshop on Information Forensics and Security (WIFS) , pp. 37-42
    • Hospodar, G.1    Maes, R.2    Verbauwhede, I.3
  • 7
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication applications
    • June
    • Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: 2004 Symposium on VLSI Circuits, pp. 176-179 (June 2004)
    • (2004) 2004 Symposium on VLSI Circuits , pp. 176-179
    • Lee, J.W.1    Lim, D.2    Gassend, B.3    Suh, G.E.4    Van Dijk, M.5    Devadas, S.6
  • 8
    • 85037371734 scopus 로고    scopus 로고
    • Side-channel analysis of PUFs and fuzzy extractors
    • McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) TRUST 2011 Springer, Heidelberg
    • Merli, D., Schuster, D., Stumpf, F., Sigl, G.: Side-channel analysis of PUFs and fuzzy extractors. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) TRUST 2011. LNCS, vol. 6740, pp. 33-47. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6740 , pp. 33-47
    • Merli, D.1    Schuster, D.2    Stumpf, F.3    Sigl, G.4
  • 10
    • 84901282930 scopus 로고    scopus 로고
    • Reliable PUF value generation by pattern matching
    • Verayo Inc.: Patent WO/2012/099657 July 26
    • Paral, Z., Devadas, S., Verayo Inc.: Patent WO/2012/099657, Reliable PUF value generation by pattern matching (July 26, 2012)
    • (2012)
    • Paral, Z.1    Devadas, S.2
  • 14
    • 33750726983 scopus 로고    scopus 로고
    • Read-Proof Hardware from Protective Coatings
    • Goubin, L., Matsui, M. (eds.) CHES 2006 Springer, Heidelberg
    • Tuyls, P., Schrijen, G.-J., Škorić, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4249 , pp. 369-383
    • Tuyls, P.1    Schrijen, G.-J.2    Škorić, B.3    Van Geloven, J.4    Verhaegh, N.5    Wolters, R.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.