-
1
-
-
84937550984
-
Provably secure passwordauthenticated key exchange using Diffe-Hellman
-
New York, NY, USA: Springer-Verlag
-
V. Boyko, P. MacKenzie, and S. Patel, "Provably secure passwordauthenticated key exchange using Diffe-Hellman," in Advances in Cryp-tology. New York, NY, USA: Springer-Verlag, 2000, pp. 156-171.
-
(2000)
Advances in Cryp-tology
, pp. 156-171
-
-
Boyko, V.1
Mackenzie, P.2
Patel, S.3
-
2
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," in Proc. 19th Int. Conf. Theory Appl. Cryptograph. Tech., 2000, pp. 139-155.
-
(2000)
Proc. 19th Int. Conf. Theory Appl. Cryptograph. Tech.
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
0037144430
-
Physical oneway functions
-
P. S. Ravikanth, B. Recht, J. Taylor, and N. Gershenfeld, "Physical oneway functions," Science, vol. 297, nos. 5589, pp. 2026-2030, 2002.
-
(2002)
Science
, vol.297
, Issue.5589
, pp. 2026-2030
-
-
Ravikanth, P.S.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
4
-
-
0038341105
-
Silicon physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon physical random functions," in Proc. Comput. Commun. Security Conf., 2002, pp. 148-160.
-
(2002)
Proc. Comput. Commun. Security Conf.
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
5
-
-
84864138410
-
-
New York, NY, USA: Springer-Verlag
-
U. Ruhrmair, S. Devadas, and F. Koushanfar, Security Based on Physical Unclonability and Disorder. New York, NY, USA: Springer-Verlag, 2011.
-
(2011)
Security Based on Physical Unclonability and Disorder
-
-
Ruhrmair, U.1
Devadas, S.2
Koushanfar, F.3
-
6
-
-
80051967839
-
A formalization of the security features of physical functions
-
May
-
F. Armknecht, R. Maes, A. Sadeghi, F.-X. Standaert, and C. Wachsmann, "A formalization of the security features of physical functions," in Proc. IEEE Symp. Security Privacy, May 2011, pp. 397-412.
-
(2011)
Proc. IEEE Symp. Security Privacy
, pp. 397-412
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.3
Standaert, F.-X.4
Wachsmann, C.5
-
7
-
-
85016215043
-
Physically unclonable functions:Astudy on the state of the art and future research directions
-
A.-R. Sadeghi and D. Naccache, Eds. New York, NY, USA: Springer-Verlag
-
R. Maes and I.Verbauwhede, "Physically unclonable functions:Astudy on the state of the art and future research directions," in Towards Hardware-Intrinsic Security, A.-R. Sadeghi and D. Naccache, Eds. New York, NY, USA: Springer-Verlag, 2010.
-
(2010)
Towards Hardware-Intrinsic Security
-
-
Maes, R.1
Verbauwhede, I.2
-
8
-
-
84903832684
-
Quo vadis, PUF
-
Mar. to be published
-
M. Rostami, J. B. Wendt, M. Potkonjak, and F. Koushanfar. (2014, Mar.). "Quo vadis, PUF." in Design, Automation & Test in Europe, to be published.
-
(2014)
Design, Automation & Test in Europe
-
-
Rostami, M.1
Wendt, J.B.2
Potkonjak, M.3
Koushanfar, F.4
-
9
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
Oct.
-
U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, and J. Schmidhuber, "Modeling attacks on physical unclonable functions," in Proc. 17th ACM Conf. Comput. Commun. Security, Oct. 2010, pp. 237-249.
-
(2010)
Proc. 17th ACM Conf. Comput. Commun. Security
, pp. 237-249
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
11
-
-
84864182393
-
Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching
-
May
-
M. Majzoobi, M. Rostami, F. Koushanfar, D. S. Wallach, and S. Devadas, "Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching," in Proc. IEEE Symp. Security Privacy Workshops, May 2012, pp. 33-44.
-
(2012)
Proc. IEEE Symp. Security Privacy Workshops
, pp. 33-44
-
-
Majzoobi, M.1
Rostami, M.2
Koushanfar, F.3
Wallach, D.S.4
Devadas, S.5
-
13
-
-
0037999043
-
Delay-based circuit authentication and applications
-
B. Gassend, D. Clarke, M. Van Dijk, and S. Devadas, "Delay-based circuit authentication and applications," in Proc. ACM Symp. Appl. Comput., 2003, pp. 294-301.
-
(2003)
Proc. ACM Symp. Appl. Comput.
, pp. 294-301
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
14
-
-
20044382924
-
Extracting secret keys from integrated circuits
-
M.S. thesis, Massachusetts Inst. Technol., Cambridge, MA, USA
-
D. Lim, "Extracting secret keys from integrated circuits," M.S. thesis, Dept. Electr. Eng. Comput., Massachusetts Inst. Technol., Cambridge, MA, USA, 2004.
-
(2004)
Dept. Electr. Eng. Comput
-
-
Lim, D.1
-
15
-
-
67249147207
-
Testing techniques for hardware security
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Testing techniques for hardware security," in Proc. Int. Test Conf., 2008, pp. 1-10.
-
(2008)
Proc. Int. Test Conf.
, pp. 1-10
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
16
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
Jun.
-
G. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Proc. 44th ACM/IEEE Des. Autom. Conf., Jun. 2007, pp. 9-14.
-
(2007)
Proc. 44th ACM/IEEE Des. Autom. Conf.
, pp. 9-14
-
-
Suh, G.1
Devadas, S.2
-
17
-
-
4344584084
-
Physical random functions
-
M.S. thesis, Massachusetts Inst. Technol., Cambridge, MA, USA, Jan
-
B. Gassend, "Physical random functions," M.S. thesis, Dept. Electr. Eng. Comput., Massachusetts Inst. Technol., Cambridge, MA, USA, Jan. 2003.
-
(2003)
Dept. Electr. Eng. Comput.
-
-
Gassend, B.1
-
18
-
-
49149115221
-
Towards robust low cost authentication for pervasive devices
-
Mar.
-
E. Oztürk, G. Hammouri, and B. Sunar, "Towards robust low cost authentication for pervasive devices," in Proc. 6th Annu. IEEE Int. Pervas. Comput. Commun., Mar. 2008, pp. 170-178.
-
(2008)
Proc. 6th Annu. IEEE Int. Pervas. Comput. Commun.
, pp. 170-178
-
-
Oztürk, E.1
Hammouri, G.2
Sunar, B.3
-
19
-
-
84887313066
-
PUF modeling attacks on simulated and silicon data
-
Nov.
-
U. Ruhrmair, J. Solter, F. Sehnke, X. Xu, A. Mahmoud, V. Stoyanova, et al., "PUF modeling attacks on simulated and silicon data," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1876-1891, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.11
, pp. 1876-1891
-
-
Ruhrmair, U.1
Solter, J.2
Sehnke, F.3
Xu, X.4
Mahmoud, A.5
Stoyanova, V.6
-
20
-
-
57849102046
-
Lightweight secure PUF
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Lightweight secure PUF," in Proc. Int. Conf. Comput. Aided Des., 2008, pp. 670-673.
-
(2008)
Proc. Int. Conf. Comput. Aided Des.
, pp. 670-673
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
21
-
-
76949093125
-
Techniques for design and implementation of secure reconfigurable PUFs
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Techniques for design and implementation of secure reconfigurable PUFs," ACM TRETS, vol. 2, no. 1, pp. 1-33, 2009.
-
(2009)
ACM Trets
, vol.2
, Issue.1
, pp. 1-33
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
24
-
-
51049117293
-
Efficient helper data key extractor on FPGAs
-
C. Bösch, J. Guajardo, A. Sadeghi, J. Shokrollahi, and P. Tuyls, "Efficient helper data key extractor on FPGAs," in Proc. 10th Int. Workshop Crypto-graph. Hardw. Embedded Syst., 2008, pp. 181-197.
-
(2008)
Proc. 10th Int. Workshop Crypto-graph. Hardw. Embedded Syst.
, pp. 181-197
-
-
Bösch, C.1
Guajardo, J.2
Sadeghi, A.3
Shokrollahi, J.4
Tuyls, P.5
-
25
-
-
70350614531
-
Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs
-
R. Maes, P. Tuyls, and I. Verbauwhede, "Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs," in Proc. 11th Int Workshop Cryptograph. Hardw. Embedded Syst., 2009, pp. 332-347.
-
(2009)
Proc. 11th Int Workshop Cryptograph. Hardw. Embedded Syst.
, pp. 332-347
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
26
-
-
76949095784
-
Secure and robust error correction for physical unclonable functions
-
Jan./Feb.
-
M.-D. M. Yu and S. Devadas, "Secure and robust error correction for physical unclonable functions," IEEE Des. Test Comput., vol. 27, no. 1, pp. 48-65, Jan./Feb. 2010.
-
(2010)
IEEE Des. Test Comput.
, vol.27
, Issue.1
, pp. 48-65
-
-
Yu, M.-D.M.1
Devadas, S.2
-
27
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Interlaken, Switzerland
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Proc. Adv. Int. Theory Appl. Conf. Cryptol. Eurocrypt, Interlaken, Switzerland, 2004, pp. 523-540.
-
(2004)
Proc. Adv. Int. Theory Appl. Conf. Cryptol. Eurocrypt
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
28
-
-
70350469042
-
Hardware-based public-key cryptography with public physically unclonable functions
-
New York, NY, USA: Springer-Verlag
-
N. Beckmann and M. Potkonjak, "Hardware-based public-key cryptography with public physically unclonable functions," in Information Hiding. New York, NY, USA: Springer-Verlag, 2009, pp. 206-220.
-
(2009)
Information Hiding.
, pp. 206-220
-
-
Beckmann, N.1
Potkonjak, M.2
-
29
-
-
79960856073
-
Ultra-low power current-based PUF
-
M. Majzoobi, G. Ghiaasi, F. Koushanfar, and S. Nassif, "Ultra-low power current-based PUF," in Proc. IEEE Int. Symp. Circuits Syst., 2011, pp. 2071-2074.
-
(2011)
Proc. IEEE Int. Symp. Circuits Syst.
, pp. 2071-2074
-
-
Majzoobi, M.1
Ghiaasi, G.2
Koushanfar, F.3
Nassif, S.4
-
30
-
-
78649302698
-
On the autocorrelation properties of truncated maximum-length sequences and their effect on the power spectrum
-
Dec.
-
M. Baldi, F. Chiaraluce, N. Boujnah, and R. Garello, "On the autocorrelation properties of truncated maximum-length sequences and their effect on the power spectrum," IEEE Trans. Signal Process., vol. 58, no. 12, pp. 6284-6297, Dec. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.12
, pp. 6284-6297
-
-
Baldi, M.1
Chiaraluce, F.2
Boujnah, N.3
Garello, R.4
-
31
-
-
79952923709
-
-
New York, NY, USA: Springer-Verlag
-
C. Paar, J. Pelzl, and B. Preneel, Understanding Cryptography: A Textbook for Students and Practitioners. New York, NY, USA: Springer-Verlag, 2010.
-
(2010)
Understanding Cryptography: A Textbook for Students and Practitioners
-
-
Paar, C.1
Pelzl, J.2
Preneel, B.3
-
32
-
-
84866642869
-
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
-
S. Katzenbeisser, Ü. Kocaba, V. Roic, A.-R. Sadeghi, I. Verbauwhede, and C.Wachsmann, "PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon," in Proc. 14th Int. Conf. Cryptograph. Hardw. Embedded Syst., 2012, pp. 283-301.
-
(2012)
Proc. 14th Int. Conf. Cryptograph. Hardw. Embedded Syst.
, pp. 283-301
-
-
Katzenbeisser, S.1
Kocaba Ü.2
Roic, V.3
Sadeghi, A.-R.4
Verbauwhede, I.5
Wachsmann, C.6
-
33
-
-
80053548561
-
FPGA-based true random number generation using circuit metastability with adaptive feedback control
-
M. Majzoobi, F. Koushanfar, and S. Devadas, "FPGA-based true random number generation using circuit metastability with adaptive feedback control," in Proc. Int. Cryptograph. Hardware Embedded Syst., 2011, pp. 17-32.
-
(2011)
Proc. Int. Cryptograph. Hardware Embedded Syst.
, pp. 17-32
-
-
Majzoobi, M.1
Koushanfar, F.2
Devadas, S.3
-
34
-
-
79952518421
-
FPGA PUF using programmable delay lines
-
Dec.
-
M. Majzoobi, F. Koushanfar, and S. Devadas, "FPGA PUF using programmable delay lines," in Proc. IEEE Int. Workshop Inf. Forensics Secu-rity, Dec. 2010, pp. 1-6.
-
(2010)
Proc. IEEE Int. Workshop Inf. Forensics Secu-rity
, pp. 1-6
-
-
Majzoobi, M.1
Koushanfar, F.2
Devadas, S.3
-
35
-
-
62349115065
-
-
1st ed. New York, NY, USA: Springer-Verlag
-
C. K. Koc, Cryptographic Engineering, 1st ed. New York, NY, USA: Springer-Verlag, 2008.
-
(2008)
Cryptographic Engineering
-
-
Koc, C.K.1
-
36
-
-
85008060937
-
A provably secure true random number generator with built-in tolerance to active attacks
-
Jan.
-
B. Sunar, W. Martin, and D. Stinson, "A provably secure true random number generator with built-in tolerance to active attacks," IEEE Trans. Comput., vol. 56, no. 1, pp. 109-119, Jan. 2007.
-
(2007)
IEEE Trans. Comput.
, vol.56
, Issue.1
, pp. 109-119
-
-
Sunar, B.1
Martin, W.2
Stinson, D.3
-
37
-
-
67650146012
-
Efficient hardware architecture of SHA-256 algorithm for trusted mobile computing
-
Berlin, Germany: Springer-Verlag
-
M. Kim, J. Ryou, and S. Jun, "Efficient hardware architecture of SHA-256 algorithm for trusted mobile computing," Information Security and Cryptology, Berlin, Germany: Springer-Verlag, 2009, pp. 240-252.
-
(2009)
Information Security and Cryptology
, pp. 240-252
-
-
Kim, M.1
Ryou, J.2
Jun, S.3
-
38
-
-
79951746759
-
DSPs, BRAMs, and a pinch of logic: Extended recipes for AES on FPGAs
-
S. Drimer, T. Guneysu, and C. Paar, "DSPs, BRAMs, and a pinch of logic: Extended recipes for AES on FPGAs," ACM Trans. Reconfigurable Technol. Syst., vol. 3, no. 1, pp. 1-3, 2010.
-
(2010)
ACM Trans. Reconfigurable Technol. Syst.
, vol.3
, Issue.1
, pp. 1-3
-
-
Drimer, S.1
Guneysu, T.2
Paar, C.3
|