메뉴 건너뛰기




Volumn 2, Issue 1, 2014, Pages 37-49

Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching

Author keywords

hardware security; Physical unclonable functions; security protocols

Indexed keywords

AUTHENTICATION; HARDWARE SECURITY; NETWORK SECURITY; REVERSE ENGINEERING;

EID: 84904854695     PISSN: None     EISSN: 21686750     Source Type: Journal    
DOI: 10.1109/TETC.2014.2300635     Document Type: Article
Times cited : (152)

References (38)
  • 1
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure passwordauthenticated key exchange using Diffe-Hellman
    • New York, NY, USA: Springer-Verlag
    • V. Boyko, P. MacKenzie, and S. Patel, "Provably secure passwordauthenticated key exchange using Diffe-Hellman," in Advances in Cryp-tology. New York, NY, USA: Springer-Verlag, 2000, pp. 156-171.
    • (2000) Advances in Cryp-tology , pp. 156-171
    • Boyko, V.1    Mackenzie, P.2    Patel, S.3
  • 3
  • 7
    • 85016215043 scopus 로고    scopus 로고
    • Physically unclonable functions:Astudy on the state of the art and future research directions
    • A.-R. Sadeghi and D. Naccache, Eds. New York, NY, USA: Springer-Verlag
    • R. Maes and I.Verbauwhede, "Physically unclonable functions:Astudy on the state of the art and future research directions," in Towards Hardware-Intrinsic Security, A.-R. Sadeghi and D. Naccache, Eds. New York, NY, USA: Springer-Verlag, 2010.
    • (2010) Towards Hardware-Intrinsic Security
    • Maes, R.1    Verbauwhede, I.2
  • 10
  • 14
    • 20044382924 scopus 로고    scopus 로고
    • Extracting secret keys from integrated circuits
    • M.S. thesis, Massachusetts Inst. Technol., Cambridge, MA, USA
    • D. Lim, "Extracting secret keys from integrated circuits," M.S. thesis, Dept. Electr. Eng. Comput., Massachusetts Inst. Technol., Cambridge, MA, USA, 2004.
    • (2004) Dept. Electr. Eng. Comput
    • Lim, D.1
  • 16
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • Jun.
    • G. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Proc. 44th ACM/IEEE Des. Autom. Conf., Jun. 2007, pp. 9-14.
    • (2007) Proc. 44th ACM/IEEE Des. Autom. Conf. , pp. 9-14
    • Suh, G.1    Devadas, S.2
  • 17
    • 4344584084 scopus 로고    scopus 로고
    • Physical random functions
    • M.S. thesis, Massachusetts Inst. Technol., Cambridge, MA, USA, Jan
    • B. Gassend, "Physical random functions," M.S. thesis, Dept. Electr. Eng. Comput., Massachusetts Inst. Technol., Cambridge, MA, USA, Jan. 2003.
    • (2003) Dept. Electr. Eng. Comput.
    • Gassend, B.1
  • 21
    • 76949093125 scopus 로고    scopus 로고
    • Techniques for design and implementation of secure reconfigurable PUFs
    • M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Techniques for design and implementation of secure reconfigurable PUFs," ACM TRETS, vol. 2, no. 1, pp. 1-33, 2009.
    • (2009) ACM Trets , vol.2 , Issue.1 , pp. 1-33
    • Majzoobi, M.1    Koushanfar, F.2    Potkonjak, M.3
  • 26
    • 76949095784 scopus 로고    scopus 로고
    • Secure and robust error correction for physical unclonable functions
    • Jan./Feb.
    • M.-D. M. Yu and S. Devadas, "Secure and robust error correction for physical unclonable functions," IEEE Des. Test Comput., vol. 27, no. 1, pp. 48-65, Jan./Feb. 2010.
    • (2010) IEEE Des. Test Comput. , vol.27 , Issue.1 , pp. 48-65
    • Yu, M.-D.M.1    Devadas, S.2
  • 27
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Interlaken, Switzerland
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Proc. Adv. Int. Theory Appl. Conf. Cryptol. Eurocrypt, Interlaken, Switzerland, 2004, pp. 523-540.
    • (2004) Proc. Adv. Int. Theory Appl. Conf. Cryptol. Eurocrypt , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 28
    • 70350469042 scopus 로고    scopus 로고
    • Hardware-based public-key cryptography with public physically unclonable functions
    • New York, NY, USA: Springer-Verlag
    • N. Beckmann and M. Potkonjak, "Hardware-based public-key cryptography with public physically unclonable functions," in Information Hiding. New York, NY, USA: Springer-Verlag, 2009, pp. 206-220.
    • (2009) Information Hiding. , pp. 206-220
    • Beckmann, N.1    Potkonjak, M.2
  • 30
    • 78649302698 scopus 로고    scopus 로고
    • On the autocorrelation properties of truncated maximum-length sequences and their effect on the power spectrum
    • Dec.
    • M. Baldi, F. Chiaraluce, N. Boujnah, and R. Garello, "On the autocorrelation properties of truncated maximum-length sequences and their effect on the power spectrum," IEEE Trans. Signal Process., vol. 58, no. 12, pp. 6284-6297, Dec. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.12 , pp. 6284-6297
    • Baldi, M.1    Chiaraluce, F.2    Boujnah, N.3    Garello, R.4
  • 33
    • 80053548561 scopus 로고    scopus 로고
    • FPGA-based true random number generation using circuit metastability with adaptive feedback control
    • M. Majzoobi, F. Koushanfar, and S. Devadas, "FPGA-based true random number generation using circuit metastability with adaptive feedback control," in Proc. Int. Cryptograph. Hardware Embedded Syst., 2011, pp. 17-32.
    • (2011) Proc. Int. Cryptograph. Hardware Embedded Syst. , pp. 17-32
    • Majzoobi, M.1    Koushanfar, F.2    Devadas, S.3
  • 35
    • 62349115065 scopus 로고    scopus 로고
    • 1st ed. New York, NY, USA: Springer-Verlag
    • C. K. Koc, Cryptographic Engineering, 1st ed. New York, NY, USA: Springer-Verlag, 2008.
    • (2008) Cryptographic Engineering
    • Koc, C.K.1
  • 36
    • 85008060937 scopus 로고    scopus 로고
    • A provably secure true random number generator with built-in tolerance to active attacks
    • Jan.
    • B. Sunar, W. Martin, and D. Stinson, "A provably secure true random number generator with built-in tolerance to active attacks," IEEE Trans. Comput., vol. 56, no. 1, pp. 109-119, Jan. 2007.
    • (2007) IEEE Trans. Comput. , vol.56 , Issue.1 , pp. 109-119
    • Sunar, B.1    Martin, W.2    Stinson, D.3
  • 37
    • 67650146012 scopus 로고    scopus 로고
    • Efficient hardware architecture of SHA-256 algorithm for trusted mobile computing
    • Berlin, Germany: Springer-Verlag
    • M. Kim, J. Ryou, and S. Jun, "Efficient hardware architecture of SHA-256 algorithm for trusted mobile computing," Information Security and Cryptology, Berlin, Germany: Springer-Verlag, 2009, pp. 240-252.
    • (2009) Information Security and Cryptology , pp. 240-252
    • Kim, M.1    Ryou, J.2    Jun, S.3
  • 38
    • 79951746759 scopus 로고    scopus 로고
    • DSPs, BRAMs, and a pinch of logic: Extended recipes for AES on FPGAs
    • S. Drimer, T. Guneysu, and C. Paar, "DSPs, BRAMs, and a pinch of logic: Extended recipes for AES on FPGAs," ACM Trans. Reconfigurable Technol. Syst., vol. 3, no. 1, pp. 1-3, 2010.
    • (2010) ACM Trans. Reconfigurable Technol. Syst. , vol.3 , Issue.1 , pp. 1-3
    • Drimer, S.1    Guneysu, T.2    Paar, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.