-
2
-
-
84887308412
-
Fault injection modeling attacks on 65nm arbiter and ro sum pufs via environmental changes
-
J. Delvaux, I. Verbauwhede, "Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes," IACR Cryptology ePrint, 2013: 619 (2013)
-
(2013)
IACR Cryptology EPrint
, vol.2013
, pp. 619
-
-
Delvaux, J.1
Verbauwhede, I.2
-
3
-
-
84904854701
-
-
US Patent Application 12/623,045 2008, US Patent 8,683,210
-
S. Devadas, "Non-networked RFlD PUF Authentication," US Patent Application 12/623,045, 2008, US Patent 8,683,210, 2014
-
(2014)
Non-networked RFlD PUF Authentication
-
-
Devadas, S.1
-
4
-
-
0038341105
-
Silicon physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, S. Devadas, "Silicon Physical Random Functions," ACM Conference on Computer and Communication Security Conference (CCS), 2002
-
(2002)
ACM Conference on Computer and Communication Security Conference (CCS
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
6
-
-
0032202014
-
Efficient noise-tolerant learning form statistical queries
-
M. Kearns, "Efficient Noise-Tolerant Learning form Statistical Queries," Journal of the ACM, 1998, vol. 45(6), pp. 983-1006
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 983-1006
-
-
Kearns, M.1
-
8
-
-
84899934434
-
Combined modeling and side channel attacks on strong PUFs
-
A. Mahmoud, U. Ruhrmair, M. Majzoobi, F. Koushanfar, "Combined Modeling and Side Channel Attacks on Strong PUFs," IACR Cryptology ePrint, 2013: 632 (2013)
-
(2013)
IACR Cryptology EPrint
, vol.632
, pp. 2013
-
-
Mahmoud, A.1
Ruhrmair, U.2
Majzoobi, M.3
Koushanfar, F.4
-
11
-
-
84864182393
-
Slenderpuf: A lightweight, robust and secure strong puf by substring matching
-
[II] M. Majzoobi, M. Rostami, F. Koushanfar, D. Wallach, S. Devadas, "SlenderPUF: A Lightweight, Robust and Secure Strong PUF by Substring Matching," IEEE International Workshop on Trustworthy Embedded Devices (TrustED), 2012
-
(2012)
IEEE International Workshop on Trustworthy Embedded Devices (TrustED
-
-
Majzoobi, M.1
Rostami, M.2
Koushanfar, F.3
Wallach, D.4
Devadas, S.5
-
14
-
-
78649989155
-
-
ACM Conference on Computer and Communication Security (CCS
-
U. Ruhrmair, F. Sehnke, J. Solter, G. Dror, S. Devadas, J. Schmidhuber, "Modeling Attacks on Physical Unclonable Functions," ACM Conference on Computer and Communication Security (CCS), 2010
-
(2010)
Modeling Attacks on Physical unclonable functions
-
-
Ruhrmair, U.1
Sehnke, F.2
Solter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
15
-
-
84887313066
-
PUF modeling attacks on simulated and silicon data
-
U. Ruhrmair, J. Solter, F. Sehnke, X. Xu, A. Mahmoud, V. Stoyanova, G. Dror, J. Schmidhuber, W. Burleson, S. Devadas, "PUF Modeling Attacks on Simulated and Silicon Data," IEEE Transactions on Information Forensics and Security (TIFS), 2013, vol. 8( 1 1), pp. 1876- 1891
-
(2013)
IEEE Transactions on Information Forensics and Security (TIFS)
, vol.8
, Issue.11
, pp. 1876-1891
-
-
Ruhrmair, U.1
Solter, J.2
Sehnke, F.3
Xu, X.4
Mahmoud, A.5
Stoyanova, V.6
Dror, G.7
Schmidhuber, J.8
Burleson, W.9
Devadas, S.10
-
16
-
-
84899905957
-
Power and timing side channels for pufs and their efficient exploitation
-
U. Ruhrmair, X. Xu, J. Solter, A. Mahmoud, F. Koushanfar, W. Burleson, "Power and Timing Side Channels for PUFs and their Efficient Exploitation," IACR Cryptology ePrint, 2013: 85 1 (2013)
-
(2013)
IACR Cryptology EPrint
, vol.2013
, pp. 851
-
-
Ruhrmair, U.1
Xu, X.2
Solter, J.3
Mahmoud, A.4
Koushanfar, F.5
Burleson, W.6
-
17
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
G. Suh, S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation," Design Automation Conference (DAC), 2007, pp. 9-14
-
(2007)
Design Automation Conference (DAC
, pp. 9-14
-
-
Suh, G.1
Devadas, S.2
-
18
-
-
80053502788
-
Lightweight and secure puf key storage using limits of machine learning
-
M. Yu, D. M'Ralhi, R. Sowell, S. Devadas, "Lightweight and Secure PUF Key Storage Using Limits of Machine Learning," Workshop on Cryptographic Hardware and Embedded Systems (CHES), 20 II, LNCS vol. 69 17, pp. 358-373
-
(2011)
Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, vol.LNCS 69
, Issue.17
, pp. 358-373
-
-
Yu, M.1
M'Ralhi, D.2
Sowell, R.3
Devadas, S.4
-
19
-
-
84864153887
-
Performance metrics and empirical results of a puf cryptographic key generation asic
-
M. Yu, R. Sowell, A. Singh, D. M'Raihi, S. Devadas, "Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC," IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2012.
-
(2012)
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST
-
-
Yu, M.1
Sowell, R.2
Singh, A.3
M'Raihi, D.4
Devadas, S.5
|