-
1
-
-
70350469042
-
Hardware-based public-key cryptography with public physically unclonable functions
-
Berlin, Germany: Springer-Verlag, ser. Lecture Notes in Computer Science
-
N. Beckmann and M. Potkonjak, Hardware-based public-key cryptography with public physically unclonable functionsInformation Hiding, vol. 5806. Berlin, Germany: Springer-Verlag, 2009, pp. 206-220, ser. Lecture Notes in Computer Science
-
(2009)
Information Hiding
, vol.5806
, pp. 206-220
-
-
Beckmann, N.1
Potkonjak, M.2
-
4
-
-
49049105769
-
Design and implementation of PUF-Based unclonable RFID ICs for anti-counterfeiting and security applications
-
May
-
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal, Design and implementation of PUF-Based unclonable RFID ICs for anti-counterfeiting and security applications in Proc. IEEE Int. Conf. RFID, May 2008, pp. 58-64
-
(2008)
Proc. IEEE Int. Conf. RFID
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
5
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Germany: Springer-Verlag ser. Lecture Notes in Computer Science
-
Y. Dodis, L. Reyzin, and A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy dataAdvances in CryptologyVEurocrypt 2004, vol. 3027. Germany: Springer-Verlag, 2004, pp. 523-540, ser. Lecture Notes in Computer Science
-
(2004)
Advances in CryptologyVEurocrypt 2004
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
6
-
-
4344584084
-
Physical random functions ms thesis
-
Cambridge, MA, USA Jan
-
B. Gassend, Physical random functionsM.S. thesis, Dept. Electr. Eng. Comput. Sci., Massachusetts Inst. Technol., Cambridge, MA, USA, Jan. 2003
-
(2003)
Dept. Electr. Eng. Comput. Sci., Massachusetts Inst. Technol
-
-
Gassend, B.1
-
7
-
-
0038341105
-
Silicon physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, Silicon physical random functions in Proc. 9th ACM Conf. Comput. Commun. Security (CCS), 2002, pp. 148-160
-
(2002)
Proc. 9th ACM Conf. Comput. Commun. Security (CCS
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
8
-
-
4344587804
-
Identification and authentication of integrated circuits
-
B. Gassend, D. Lim, D. Clarke, M. van Dijk, and S. Devadas, Identification and authentication of integrated circuitsConcurrency Comput., Practice Exp., vol. 16, no. 11, pp. 1077-1098, 2004
-
(2004)
Concurrency Comput. Practice Exp
, vol.16
, Issue.11
, pp. 1077-1098
-
-
Gassend, B.1
Lim, D.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
-
9
-
-
84904854690
-
Getting out of the STARTing block
-
S. Graybeal and P. McFate, Getting out of the STARTing block Sci. Amer., vol. 261, no. 6, 1989
-
(1989)
Sci. Amer
, vol.261
, Issue.6
-
-
Graybeal, S.1
McFate, P.2
-
10
-
-
84883702794
-
Cloning physically unclonable functions
-
DOI: 10.1109/HST.2013.6581556
-
C. Helfmeier, C. Boit, D. Nedospasov, and J.-P. Seifert, Cloning physically unclonable functions in Proc. IEEE Int. Symp. Hardware-Oriented Security Trust, 2013, DOI: 10.1109/HST.2013.6581556
-
(2013)
Proc. IEEE Int. Symp. Hardware-Oriented Security Trust
-
-
Helfmeier, C.1
Boit, C.2
Nedospasov, D.3
Seifert, J.-P.4
-
11
-
-
84904856767
-
-
Malaga, Spain Jul
-
D. Holcomb, W. Burleson, and K. Fu, Initial SRAM state as a fingerprint and source of true random numbers for RFID tagspresented at Conf. RFID Security, Malaga, Spain, Jul. 11-13, 2007
-
(2007)
Initial SRAM State As A Fingerprint and Source of True Random Numbers for RFID Tagspresented at Conf. RFID Security
, pp. 11-13
-
-
Holcomb, D.1
Burleson, W.2
Fu, K.3
-
12
-
-
68949175522
-
Power-up SRAM state as an identifying fingerprint and source of true random numbers
-
Sep
-
D. Holcomb, W. Burleson, and K. Fu, Power-up SRAM state as an identifying fingerprint and source of true random numbers IEEE Trans. Comput., vol. 58, no. 9, pp. 1198-1210, Sep. 2009
-
(2009)
IEEE Trans. Comput
, vol.58
, Issue.9
, pp. 1198-1210
-
-
Holcomb, D.1
Burleson, W.2
Fu, K.3
-
13
-
-
85010296813
-
Anti-counterfeiting: Mixing the physical and the digital world
-
A.-R. Sadeghi and D. Naccache, Eds. New York, NY, USA: Springer-Verlag
-
D. Kirovski, Anti-counterfeiting: Mixing the physical and the digital world Towards Hardware-Intrinsic Security, A.-R. Sadeghi and D. Naccache, Eds. New York, NY, USA: Springer-Verlag, 2010, pp. 223-233
-
(2010)
Towards Hardware-Intrinsic Security
, pp. 223-233
-
-
Kirovski, D.1
-
14
-
-
84903145698
-
Pufatt: Embedded platform attestation based on novel processor-based pufs presented at the acm/ieee
-
Jun
-
J. Kong, F. Koushanfar, P. K. Pendyala, A.-R. Sadeghi, and C. Wachsmann, PUFatt: Embedded platform attestation based on novel processor-based PUFs presented at the ACM/IEEE Design Autom. Conf., San Francisco, CA, USA, Jun. 1-4, 2014
-
(2014)
Design Autom. Conf., San Francisco, CA, USA
, vol.1
, Issue.4
-
-
Kong, J.1
Koushanfar, F.2
Pendyala, P.K.3
Sadeghi, A.-R.4
Wachsmann, C.5
-
15
-
-
68949171332
-
-
U.S. Patent 6 Sep
-
P. Layman, S. Chaudhry, J. Norman, and J. Thomson, Electronic fingerprinting of semiconductor integrated circuitsU.S. Patent 6 738 294, Sep. 2002
-
(2002)
Electronic Fingerprinting of Semiconductor Integrated Circuits
, vol.738
, pp. 294
-
-
Layman, P.1
Chaudhry, S.2
Norman, J.3
Thomson, J.4
-
16
-
-
4544381402
-
A technique to build a secret key in integrated circuits with identification and authentication applications
-
J.-W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, A technique to build a secret key in integrated circuits with identification and authentication applications in Proc. IEEE VLSI Circuits Symp., 2004, pp. 176-179
-
(2004)
Proc. IEEE VLSI Circuits Symp
, pp. 176-179
-
-
Lee, J.-W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
17
-
-
20044382924
-
Extracting secret keys from integrated circuits MS thesis
-
Cambridge, MA, USA May
-
D. Lim, Extracting secret keys from integrated circuits M.S. thesis, Dept. Electr. Eng. Comput. Sci., Massachusetts Inst. Technol., Cambridge, MA, USA, May 2004
-
(2004)
Dept. Electr. Eng. Comput. Sci., Massachusetts Inst. Technol
-
-
Lim, D.1
-
18
-
-
70350614531
-
-
Berlin, Germany: Springer-Verlag 2009 ser. Lecture Notes in Computer Science
-
R. Maes, P. Tuyls, and I. Verbauwhede, Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs Cryptographic Hardware and Embedded SystemsVCHES 2009, vol. 5747. Berlin, Germany: Springer-Verlag, 2009, pp. 332-347, ser. Lecture Notes in Computer Science
-
(2009)
Low-overhead Implementation of A Soft Decision Helper Data Algorithm for SRAM PUFs Cryptographic Hardware and Embedded SystemsVCHES
, vol.5747
, pp. 332-347
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
19
-
-
84899934434
-
-
A. Mahmoud, U. Rührmair, M. Majzoobi, and F. Koushanfar, Combined modeling and side channel attacks on strong PUFs Rep. 2013/ 632, 2013
-
(2013)
Combined Modeling and Side Channel Attacks on Strong PUFs Rep
, vol.632
, pp. 2013
-
-
Mahmoud, A.1
Rührmair, U.2
Majzoobi, M.3
Koushanfar, F.4
-
20
-
-
78549254941
-
-
Berlin, Germany: Springer-Verlag ser. Lecture Notes in Computer Science
-
M. Majzoobi, A. Elnably, and F. Koushanfar, FPGA time-bounded unclonable authentication Information Hiding, vol. 6387. Berlin, Germany: Springer-Verlag, 2010, pp. 1-16, ser. Lecture Notes in Computer Science
-
(2010)
FPGA Time-bounded Unclonable Authentication Information Hiding
, vol.6387
, pp. 1-16
-
-
Majzoobi, M.1
Elnably, A.2
Koushanfar, F.3
-
21
-
-
80051746634
-
Time-bounded authentication of FPGAs
-
Sep
-
M. Majzoobi and F. Koushanfar, Time-bounded authentication of FPGAsIEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pt. 2, pp. 1123-1135, Sep. 2011
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3 PART 2
, pp. 1123-1135
-
-
Majzoobi, M.1
Koushanfar, F.2
-
24
-
-
76949093125
-
Techniques for design and implementation of secure reconfigurable pufs acm
-
DOI: 10.1145/ 1502781.1502786
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak, Techniques for design and implementation of secure reconfigurable PUFs ACM Trans. Reconfigurable Technol. Syst., vol. 2, no. 1, 2009, DOI: 10.1145/ 1502781.1502786
-
(2009)
Trans. Reconfigurable Technol. Syst
, vol.2
, Issue.1
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
25
-
-
84864182393
-
Slender PUF protocol: A lightweight robust secure authentication by substring matching
-
M. Majzoobi, M. Rostami, F. Koushanfar, D. S. Wallach, and S. Devadas, Slender PUF protocol: A lightweight, robust, secure authentication by substring matching in Proc. IEEE Symp. Security Privacy Workshops, 2012, pp. 33-44
-
(2012)
Proc. IEEE Symp. Security Privacy Workshops
, pp. 33-44
-
-
Majzoobi, M.1
Rostami, M.2
Koushanfar, F.3
Wallach, D.S.4
Devadas, S.5
-
27
-
-
84555217843
-
Semi-invasive em attack on fpga ro pufs and countermeasures
-
D. Merli, D. Schuster, F. Stumpf, and G. Sigl, Semi-invasive em attack on FPGA RO PUFs and countermeasures in Proc. Workshop Embedded Syst. Security, 2011, pp. 2:1-2:9
-
(2011)
Proc. Workshop Embedded Syst. Security
, vol.2
, Issue.9
, pp. 1-2
-
-
Merli, D.1
Schuster, D.2
Stumpf, F.3
Sigl, G.4
-
30
-
-
0037144430
-
-
R. S. Pappu, P. S. Ravikanth, B. Recht, J. Taylor, and N. Gershenfeld, Physical one-way functions Science, vol. 297, pp. 2026-2030, 2002
-
(2002)
Physical One-way Functions Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.S.1
Ravikanth, P.S.2
Recht, B.3
Taylor, J.4
Gershenfeld, N.5
-
31
-
-
84904854695
-
Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching
-
DOI: 10.1109/TETC. 2014.2300635
-
M. Rostami, M. Majzoobi, F. Koushanfar, D. Wallach, and S. Devadas, Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching IEEE Trans. Emerging Topics Comput., 2014, DOI: 10.1109/TETC. 2014.2300635
-
(2014)
IEEE Trans. Emerging Topics Comput
-
-
Rostami, M.1
Majzoobi, M.2
Koushanfar, F.3
Wallach, D.4
Devadas, S.5
-
32
-
-
84903832684
-
Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security
-
article 352
-
M. Rostami, J. B. Wendt, M. Potkonjak, and F. Koushanfar, Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security in Proc. Conf. Design Autom. Test Eur., 2014, article 352
-
(2014)
Proc. Conf. Design Autom. Test Eur
-
-
Rostami, M.1
Wendt, J.B.2
Potkonjak, M.3
Koushanfar, F.4
-
33
-
-
77950450649
-
SIMPL systems: On a public key variant of physical unclonable functionsInternational
-
U. Rührmair, SIMPL systems: On a public key variant of physical unclonable functionsInternational Association for Cryptologic Research, Tech. Rep., 2009
-
(2009)
Association for Cryptologic Research Tech. Rep
-
-
Rührmair, U.1
-
34
-
-
84943152937
-
Security based on physical unclonability and disorder introduction to hardware security and trust
-
Eds. New York, NY, USA: Springer-Verlag
-
U. Rührmair, S. Devadas, and F. Koushanfar, Security based on physical unclonability and disorder Introduction to Hardware Security and Trust, M. Tehranipoor and C. Wang, Eds. New York, NY, USA: Springer-Verlag, 2012, pp. 65-102
-
(2012)
M. Tehranipoor and C. Wang
, pp. 65-102
-
-
Rührmair, U.1
Devadas, S.2
Koushanfar, F.3
-
35
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, and J. Schmidhuber, Modeling attacks on physical unclonable functions in Proc. 17th ACM Conf. Comput. Commun. Security, 2010, pp. 237-249
-
(2010)
Proc. 17th ACM Conf. Comput. Commun. Security
, pp. 237-249
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
36
-
-
84899905957
-
-
U. Rührmair, X. Xu, J. Slter, A. Mahmoud, F. Koushanfar, and W. Burleson, Power and timing side channels for PUFs and their efficient exploitation Rep. 2013/851, 2013
-
(2013)
Power and Timing Side Channels for PUFs and Their Efficient Exploitation Rep. 2013/851
-
-
Rührmair, U.1
Xu., X.2
Slter, J.3
Mahmoud, A.4
Koushanfar, F.5
Burleson, W.6
-
37
-
-
34548818732
-
A 1.6 pJ/bit 96 (percent) stable chip ID generating circuit using process variations
-
Y. Su, J. Holleman, and B. Otis, A 1.6 pJ/bit 96 (percent) stable chip ID generating circuit using process variations in Proc. IEEE Int. Solid-State Circuits Conf., 2007, pp. 200-201
-
(2007)
Proc. IEEE Int. Solid-State Circuits Conf
, pp. 200-201
-
-
Su., Y.1
Holleman, J.2
Otis, B.3
-
38
-
-
33845221062
-
-
Ph.D. dissertation, Dept. Electr. Eng. Comput. Sci., Massachusetts Inst. Technol., Cambridge, MA, USA, Aug
-
G. E. Suh, AEGIS: A single-chip secure processor Ph.D. dissertation, Dept. Electr. Eng. Comput. Sci., Massachusetts Inst. Technol., Cambridge, MA, USA, Aug. 2005
-
(2005)
AEGIS: A Single-chip Secure Processor
-
-
Suh, G.E.1
-
39
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
-
G. E. Suh and S. Devadas, Physical unclonable functions for device authentication and secret key generationin Proc. ACM/IEEE Design Autom. Conf., 2007, pp. 9-14 (Pubitemid 47129916)
-
(2007)
Proceedings - Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
40
-
-
76949095784
-
Secure and robust error correction for physical unclonable functions
-
Jan./Feb
-
M.-D. M. Yu and S. Devadas, Secure and robust error correction for physical unclonable functions IEEE Design Test Comput., vol. 27, no. 1, pp. 48-65, Jan./Feb. 2010
-
(2010)
IEEE Design Test Comput
, vol.27
, Issue.1
, pp. 48-65
-
-
Yu, M.-D.M.1
Devadas, S.2
-
41
-
-
80053502788
-
-
Berlin, Germany: Springer-Verlag ser. Lecture Notes in Computer Science
-
M.-D. M. Yu, D. MRaihi, R. Sowell, and S. Devadas, Lightweight and secure PUF key storage using limits of machine learning in Cryptographic Hardware and Embedded SystemsVCHES 2011, vol. 6917. Berlin, Germany: Springer-Verlag, 2011, pp. 358-373, ser. Lecture Notes in Computer Science
-
(2011)
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning in Cryptographic Hardware and Embedded SystemsVCHES 2011
, vol.6917
, pp. 358-373
-
-
Yu, M.-D.M.1
Mraihi, D.2
Sowell, R.3
Devadas, S.4
-
42
-
-
84864153887
-
Performance metrics and empirical results of a PUF cryptographic key generation ASIC
-
M.-D.M. Yu, R. Sowell, A. Singh, D.M Raihi, and S. Devadas,Performance metrics and empirical results of a PUF cryptographic key generation ASIC in Proc. IEEE Int. Symp. Hardware-Oriented Security Trust, 2012, pp. 108-115
-
(2012)
Proc. IEEE Int. Symp. Hardware-Oriented Security Trust
, pp. 108-115
-
-
Yu, M.-D.M.1
Sowell, R.2
Singh, A.3
Mraihi, D.4
Devadas, S.5
|