-
1
-
-
84910604804
-
-
S. B. Ors, G. Frank, E. Oswald, B. Preneel, and A. Graz, "Power-Analysis Attack on an ASIC AES implementation," 2001
-
(2001)
Power-Analysis Attack on An ASIC AES Implementation
-
-
Ors, S.B.1
Frank, G.2
Oswald, E.3
Preneel, B.4
Graz, A.5
-
2
-
-
0038341105
-
Silicon physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon Physical Random Functions," Proc. 9th ACM Conf. Comput. Commun. Secur., 2002.
-
(2002)
Proc. 9th ACM Conf. Comput. Commun. Secur
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
3
-
-
0003970344
-
-
Springer-Verlag New York Incorporated
-
A. Salomaa, Public-key cryptography, vol. 23. Springer-Verlag New York Incorporated, 1996.
-
(1996)
Public-key Cryptography
, vol.23
-
-
Salomaa, A.1
-
4
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
G. E. G. Suh and S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation," in 44th ACM/IEEE Design Automation Conference, 2007.
-
(2007)
44th ACM/ IEEE Design Automation Conference
-
-
Suh, G.E.G.1
Devadas, S.2
-
5
-
-
84889048008
-
Invasive PUF analysis
-
D. Nedospasov, J.-P. Seifert, C. Helfmeier, and C. Boit, "Invasive PUF analysis," in Fault Diagnosis and Tolerance in Cryptography (FDTC), 2013 Workshop on, 2013.
-
(2013)
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2013 Workshop on
-
-
Nedospasov, D.1
Seifert, J.-P.2
Helfmeier, C.3
Boit, C.4
-
7
-
-
84864182393
-
Slender puf protocol: A lightweight, robust, and secure authentication by substring matching
-
M. Majzoobi, M. Rostami, F. Koushanfar, D. S. Wallach, and S. Devadas, "Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching," in IEEE Symposium on Security and Privacy Workshops, 2012.
-
(2012)
IEEE Symposium on Security and Privacy Workshops
-
-
Majzoobi, M.1
Rostami, M.2
Koushanfar, F.3
Wallach, D.S.4
Devadas, S.5
-
9
-
-
85016215043
-
Physically unclonable functions: A study on the state of the art and future research directions
-
R. Maes and I. Verbauwhede, "Physically unclonable functions: A study on the state of the art and future research directions," Hardw.-Intrinsic Secur., pp. 3-37, 2010.
-
(2010)
Hardw.-Intrinsic Secur
, pp. 3-37
-
-
Maes, R.1
Verbauwhede, I.2
-
11
-
-
68949175522
-
Power-up sram state as an identifying fingerprint and source of true Random Numbers
-
D. E. Holcomb, W. P. Burleson, and K. Fu, "Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers," Comput. IEEE Trans. On, vol. 58, no. 9, 2009.
-
(2009)
Comput. IEEE Trans. on
, vol.58
, Issue.9
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
14
-
-
84885615311
-
ClockPUF: Physical unclonable functions based on clock networks
-
Y. Yao, M. Kim, J. Li, I. Markov, and F. Koushanfar, "ClockPUF: Physical Unclonable Functions based on Clock Networks," in Design, Automation & Test in Europe, 2013.
-
(2013)
Design, Automation & Test in Europe
-
-
Yao, Y.1
Kim, M.2
Li, J.3
Markov, I.4
Koushanfar, F.5
-
15
-
-
84903837858
-
Strong pufs: Models, constructions, and security proofs
-
A.-R. Sadeghi and D. Naccache, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg
-
U. Rührmair, H. Busch, and S. Katzenbeisser, "Strong PUFs: Models, Constructions, and Security Proofs," in Towards Hardware-Intrinsic Security, A.-R. Sadeghi and D. Naccache, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.
-
(2010)
Towards Hardware-Intrinsic Security
-
-
Rührmair, U.1
Busch, H.2
Katzenbeisser, S.3
-
16
-
-
84865824388
-
Reverse fuzzy extractors: Enabling lightweight mutual authentication for puf-enabled rfids
-
A. Van Herrewege, S. Katzenbeisser, R. Maes, R. Peeters, K. U. Leuven, and E. Cosic, "Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs," Financ. Cryptogr. Data Secur., pp. 374-389, 2012.
-
(2012)
Financ. Cryptogr. Data Secur
, pp. 374-389
-
-
Van Herrewege, A.1
Katzenbeisser, S.2
Maes, R.3
Peeters, R.4
Leuven, K.U.5
Cosic, E.6
-
17
-
-
76949095784
-
Secure and robust error correction for physical unclonable functions
-
Jan
-
M.-D. (Mandel) Yu and S. Devadas, "Secure and Robust Error Correction for Physical Unclonable Functions," IEEE Des. Test Comput., vol. 27, no. 1, pp. 48-65, Jan. 2010.
-
(2010)
IEEE Des. Test Comput
, vol.27
, Issue.1
, pp. 48-65
-
-
Yu, M.-D.1
Devadas, S.2
-
18
-
-
84864149092
-
Complementary ibs: Application specific error correction for pufs
-
M. Hiller, D. Merli, F. Stumpf, and G. Sigl, "Complementary IBS: Application specific error correction for PUFs," in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012, no. i.
-
(2012)
2012 IEEE International Symposium on Hardware-Oriented Security and Trust
, Issue.1
-
-
Hiller, M.1
Merli, D.2
Stumpf, F.3
Sigl, G.4
-
21
-
-
84867927389
-
SPONGENT: A lightweight hash function
-
Springer
-
A. Bogdanov, M. Knežević, G. Leander, D. Toz, K. Varici, and I. Verbauwhede, "SPONGENT: A lightweight hash function," in Cryptographic Hardware and Embedded Systems-CHES 2011, Springer, 2011.
-
(2011)
Cryptographic Hardware and Embedded Systems-CHES 2011
-
-
Bogdanov, A.1
Knežević, M.2
Leander, G.3
Toz, D.4
Varici, K.5
Verbauwhede, I.6
-
22
-
-
78549250580
-
Hardware-based public-key cryptography with public physically unclonable functions
-
N. Beckmann and M. Potkonjak, "Hardware-based public-key cryptography with public physically unclonable functions," in Information Hiding, 2009.
-
(2009)
Information Hiding
-
-
Beckmann, N.1
Potkonjak, M.2
-
23
-
-
80052681348
-
Differential public physically unclonable functions: Architecture and applications
-
M. Potkonjak, S. Meguerdichian, A. Nahapetian, and S. Wei, "Differential public physically unclonable functions: architecture and applications," 48th ACMEDACIEEE Des. Autom. Conf., 2011.
-
(2011)
48th ACMEDACIEEE Des. Autom. Conf
-
-
Potkonjak, M.1
Meguerdichian, S.2
Nahapetian, A.3
Wei, S.4
-
24
-
-
49149115221
-
Towards robust low cost authentication for pervasive devices
-
Öztürk, Erdinc, G. Hammouri, and B. Sunar, "Towards robust low cost authentication for pervasive devices," in Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE International Conference on, 2008.
-
(2008)
Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE International Conference on
-
-
Erdinc Ö.1
Hammouri, G.2
Sunar, B.3
-
25
-
-
55349112850
-
A tamper-proof and lightweight authentication scheme
-
Dec
-
G. Hammouri, E. Öztürk, and B. Sunar, "A tamper-proof and lightweight authentication scheme," Pervasive Mob. Comput., vol. 4, no. 6, pp. 807-818, Dec. 2008.
-
(2008)
Pervasive Mob. Comput
, vol.4
, Issue.6
, pp. 807-818
-
-
Hammouri, G.1
Öztürk, E.2
Sunar, B.3
-
26
-
-
84889021011
-
A formal definition and a new security mechanism of physical unclonable functions
-
Springer
-
R. Plaga and F. Koob, "A formal definition and a new security mechanism of physical unclonable functions," in Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance, Springer, 2012.
-
(2012)
Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance
-
-
Plaga, R.1
Koob, F.2
-
27
-
-
80051967839
-
A formalization of the security features of physical functions
-
F. Armknecht, R. Maes, A.-R. Sadeghi, F.-X. Standaert, and C. Wachsmann, "A Formalization of the Security Features of Physical Functions," in Security and Privacy (SP), 2011 IEEE Symposium on, 2011.
-
(2011)
Security and Privacy (SP), 2011 IEEE Symposium on
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.-R.3
Standaert, F.-X.4
Wachsmann, C.5
-
30
-
-
84910673789
-
-
K. Pongaliur, Z. Abraham, A. X. Liu, L. Xiao, and L. Kempel, "Securing Sensor Nodes Against Side Channel Attacks," 2008.
-
(2008)
Securing Sensor Nodes Against Side Channel Attacks
-
-
Pongaliur, K.1
Abraham, Z.2
Liu, A.X.3
Xiao, L.4
Kempel, L.5
-
31
-
-
50849138825
-
When AES blinks: Introducing optical side channel
-
J. Ferrigno and M. Hlaváč, "When AES blinks: introducing optical side channel," IET Inf. Secur., vol. 2, no. 3, p. 94, 2008.
-
(2008)
IET Inf. Secur
, vol.2
, Issue.3
, pp. 94
-
-
Ferrigno, J.1
Hlaváč, M.2
-
32
-
-
21644475650
-
RIFLE: An architectural framework for user-centric information-flow security
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August, "RIFLE: An architectural framework for user-centric information-flow security," in Microarchitecture, 2004. MICRO-37 2004. 37th International Symposium on, 2004.
-
(2004)
Microarchitecture, 2004. MICRO-37 2004. 37th International Symposium on
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
33
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
May
-
O. Goldreich and R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs," J ACM, vol. 43, no. 3, May 1996.
-
(1996)
J ACM
, vol.43
, Issue.3
-
-
Goldreich, O.1
Ostrovsky, R.2
-
34
-
-
84910636096
-
-
M. Maas, E. Love, E. Stefanov, M. Tiwari, E. Shi, K. Asanovic, J. Kubiatowicz, and D. Song, "PHANTOM: practical oblivious computation in a secure processor," 2013.
-
(2013)
PHANTOM: Practical Oblivious Computation in A Secure Processor
-
-
Maas, M.1
Love, E.2
Stefanov, E.3
Tiwari, M.4
Shi, E.5
Asanovic, K.6
Kubiatowicz, J.7
Song, D.8
-
35
-
-
68949195262
-
FPGA intrinsic PUFs and their use for IP protection
-
Springer
-
J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," in Cryptographic Hardware and Embedded Systems-CHES 2007, Springer, 2007.
-
(2007)
Cryptographic Hardware and Embedded Systems-CHES 2007
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
39
-
-
0034318245
-
An efficient remote use authentication scheme using smart cards
-
H.-M. Sun, "An efficient remote use authentication scheme using smart cards," Consum. Electron. IEEE Trans. On, vol. 46, no. 4, pp. 958-961, 2000.
-
(2000)
Consum. Electron IEEE Trans. on
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.-M.1
-
40
-
-
77949367884
-
Realizing robust user authentication in sensor networks
-
Z. Benenson, N. Gedicke, and O. Raivio, "Realizing robust user authentication in sensor networks," Real-World Wirel. Sens. Netw. REALWSN, vol. 14, 2005.
-
(2005)
Real-World Wirel. Sens. Netw. REALWSN
, vol.14
-
-
Benenson, Z.1
Gedicke, N.2
Raivio, O.3
-
42
-
-
84881258838
-
Recyclable pufs: Logically reconfigurable pufs
-
S. Katzenbeisser, Ü. Kocabas, V. Van Der Leest, A. Sadeghi, G. Schrijen, H. Schröder, and C. Wachsmann, "Recyclable PUFs: Logically Reconfigurable PUFs," J. Cryptogr. Eng., 2011.
-
(2011)
J. Cryptogr. Eng
-
-
Katzenbeisser, S.1
Kocabas Ü.2
Leest Der V.Van3
Sadeghi, A.4
Schrijen, G.5
Schröder, H.6
Wachsmann, C.7
|