메뉴 건너뛰기




Volumn 102, Issue 8, 2014, Pages 1126-1141

Physical unclonable functions and applications: A tutorial

Author keywords

Arbiter; index based coding; pattern matching; physical unclonable function (PUF); public model PUFs; ring oscillator; SRAM; unclonable

Indexed keywords

AUTHENTICATION; COSTS; ERROR CORRECTION; HARDWARE SECURITY; PATTERN MATCHING; STATIC RANDOM ACCESS STORAGE;

EID: 84904855440     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/JPROC.2014.2320516     Document Type: Review
Times cited : (1032)

References (42)
  • 1
    • 70350469042 scopus 로고    scopus 로고
    • Hardware-based public-key cryptography with public physically unclonable functions
    • Berlin, Germany: Springer-Verlag, ser. Lecture Notes in Computer Science
    • N. Beckmann and M. Potkonjak, Hardware-based public-key cryptography with public physically unclonable functionsInformation Hiding, vol. 5806. Berlin, Germany: Springer-Verlag, 2009, pp. 206-220, ser. Lecture Notes in Computer Science
    • (2009) Information Hiding , vol.5806 , pp. 206-220
    • Beckmann, N.1    Potkonjak, M.2
  • 4
    • 49049105769 scopus 로고    scopus 로고
    • Design and implementation of PUF-Based unclonable RFID ICs for anti-counterfeiting and security applications
    • May
    • S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal, Design and implementation of PUF-Based unclonable RFID ICs for anti-counterfeiting and security applications in Proc. IEEE Int. Conf. RFID, May 2008, pp. 58-64
    • (2008) Proc. IEEE Int. Conf. RFID , pp. 58-64
    • Devadas, S.1    Suh, E.2    Paral, S.3    Sowell, R.4    Ziola, T.5    Khandelwal, V.6
  • 5
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Germany: Springer-Verlag ser. Lecture Notes in Computer Science
    • Y. Dodis, L. Reyzin, and A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy dataAdvances in CryptologyVEurocrypt 2004, vol. 3027. Germany: Springer-Verlag, 2004, pp. 523-540, ser. Lecture Notes in Computer Science
    • (2004) Advances in CryptologyVEurocrypt 2004 , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 9
    • 84904854690 scopus 로고
    • Getting out of the STARTing block
    • S. Graybeal and P. McFate, Getting out of the STARTing block Sci. Amer., vol. 261, no. 6, 1989
    • (1989) Sci. Amer , vol.261 , Issue.6
    • Graybeal, S.1    McFate, P.2
  • 12
    • 68949175522 scopus 로고    scopus 로고
    • Power-up SRAM state as an identifying fingerprint and source of true random numbers
    • Sep
    • D. Holcomb, W. Burleson, and K. Fu, Power-up SRAM state as an identifying fingerprint and source of true random numbers IEEE Trans. Comput., vol. 58, no. 9, pp. 1198-1210, Sep. 2009
    • (2009) IEEE Trans. Comput , vol.58 , Issue.9 , pp. 1198-1210
    • Holcomb, D.1    Burleson, W.2    Fu, K.3
  • 13
    • 85010296813 scopus 로고    scopus 로고
    • Anti-counterfeiting: Mixing the physical and the digital world
    • A.-R. Sadeghi and D. Naccache, Eds. New York, NY, USA: Springer-Verlag
    • D. Kirovski, Anti-counterfeiting: Mixing the physical and the digital world Towards Hardware-Intrinsic Security, A.-R. Sadeghi and D. Naccache, Eds. New York, NY, USA: Springer-Verlag, 2010, pp. 223-233
    • (2010) Towards Hardware-Intrinsic Security , pp. 223-233
    • Kirovski, D.1
  • 16
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits with identification and authentication applications
    • J.-W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, A technique to build a secret key in integrated circuits with identification and authentication applications in Proc. IEEE VLSI Circuits Symp., 2004, pp. 176-179
    • (2004) Proc. IEEE VLSI Circuits Symp , pp. 176-179
    • Lee, J.-W.1    Lim, D.2    Gassend, B.3    Suh, G.E.4    Van Dijk, M.5    Devadas, S.6
  • 21
    • 80051746634 scopus 로고    scopus 로고
    • Time-bounded authentication of FPGAs
    • Sep
    • M. Majzoobi and F. Koushanfar, Time-bounded authentication of FPGAsIEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pt. 2, pp. 1123-1135, Sep. 2011
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 PART 2 , pp. 1123-1135
    • Majzoobi, M.1    Koushanfar, F.2
  • 23
  • 24
    • 76949093125 scopus 로고    scopus 로고
    • Techniques for design and implementation of secure reconfigurable pufs acm
    • DOI: 10.1145/ 1502781.1502786
    • M. Majzoobi, F. Koushanfar, and M. Potkonjak, Techniques for design and implementation of secure reconfigurable PUFs ACM Trans. Reconfigurable Technol. Syst., vol. 2, no. 1, 2009, DOI: 10.1145/ 1502781.1502786
    • (2009) Trans. Reconfigurable Technol. Syst , vol.2 , Issue.1
    • Majzoobi, M.1    Koushanfar, F.2    Potkonjak, M.3
  • 26
  • 31
    • 84904854695 scopus 로고    scopus 로고
    • Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching
    • DOI: 10.1109/TETC. 2014.2300635
    • M. Rostami, M. Majzoobi, F. Koushanfar, D. Wallach, and S. Devadas, Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching IEEE Trans. Emerging Topics Comput., 2014, DOI: 10.1109/TETC. 2014.2300635
    • (2014) IEEE Trans. Emerging Topics Comput
    • Rostami, M.1    Majzoobi, M.2    Koushanfar, F.3    Wallach, D.4    Devadas, S.5
  • 33
    • 77950450649 scopus 로고    scopus 로고
    • SIMPL systems: On a public key variant of physical unclonable functionsInternational
    • U. Rührmair, SIMPL systems: On a public key variant of physical unclonable functionsInternational Association for Cryptologic Research, Tech. Rep., 2009
    • (2009) Association for Cryptologic Research Tech. Rep
    • Rührmair, U.1
  • 34
    • 84943152937 scopus 로고    scopus 로고
    • Security based on physical unclonability and disorder introduction to hardware security and trust
    • Eds. New York, NY, USA: Springer-Verlag
    • U. Rührmair, S. Devadas, and F. Koushanfar, Security based on physical unclonability and disorder Introduction to Hardware Security and Trust, M. Tehranipoor and C. Wang, Eds. New York, NY, USA: Springer-Verlag, 2012, pp. 65-102
    • (2012) M. Tehranipoor and C. Wang , pp. 65-102
    • Rührmair, U.1    Devadas, S.2    Koushanfar, F.3
  • 37
    • 34548818732 scopus 로고    scopus 로고
    • A 1.6 pJ/bit 96 (percent) stable chip ID generating circuit using process variations
    • Y. Su, J. Holleman, and B. Otis, A 1.6 pJ/bit 96 (percent) stable chip ID generating circuit using process variations in Proc. IEEE Int. Solid-State Circuits Conf., 2007, pp. 200-201
    • (2007) Proc. IEEE Int. Solid-State Circuits Conf , pp. 200-201
    • Su., Y.1    Holleman, J.2    Otis, B.3
  • 38
    • 33845221062 scopus 로고    scopus 로고
    • Ph.D. dissertation, Dept. Electr. Eng. Comput. Sci., Massachusetts Inst. Technol., Cambridge, MA, USA, Aug
    • G. E. Suh, AEGIS: A single-chip secure processor Ph.D. dissertation, Dept. Electr. Eng. Comput. Sci., Massachusetts Inst. Technol., Cambridge, MA, USA, Aug. 2005
    • (2005) AEGIS: A Single-chip Secure Processor
    • Suh, G.E.1
  • 39
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
    • G. E. Suh and S. Devadas, Physical unclonable functions for device authentication and secret key generationin Proc. ACM/IEEE Design Autom. Conf., 2007, pp. 9-14 (Pubitemid 47129916)
    • (2007) Proceedings - Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 40
    • 76949095784 scopus 로고    scopus 로고
    • Secure and robust error correction for physical unclonable functions
    • Jan./Feb
    • M.-D. M. Yu and S. Devadas, Secure and robust error correction for physical unclonable functions IEEE Design Test Comput., vol. 27, no. 1, pp. 48-65, Jan./Feb. 2010
    • (2010) IEEE Design Test Comput , vol.27 , Issue.1 , pp. 48-65
    • Yu, M.-D.M.1    Devadas, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.