메뉴 건너뛰기




Volumn , Issue , 2014, Pages

System-of-PUFs: Multilevel security for embedded systems

Author keywords

Hardware authentication; Physically unclonable functions

Indexed keywords

AUTHENTICATION; ELECTRIC POWER TRANSMISSION NETWORKS; EMBEDDED SYSTEMS; HARDWARE-SOFTWARE CODESIGN; SMART CARDS;

EID: 84910612276     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2656075.2656099     Document Type: Conference Paper
Times cited : (18)

References (42)
  • 3
    • 0003970344 scopus 로고    scopus 로고
    • Springer-Verlag New York Incorporated
    • A. Salomaa, Public-key cryptography, vol. 23. Springer-Verlag New York Incorporated, 1996.
    • (1996) Public-key Cryptography , vol.23
    • Salomaa, A.1
  • 4
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • G. E. G. Suh and S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation," in 44th ACM/IEEE Design Automation Conference, 2007.
    • (2007) 44th ACM/ IEEE Design Automation Conference
    • Suh, G.E.G.1    Devadas, S.2
  • 9
    • 85016215043 scopus 로고    scopus 로고
    • Physically unclonable functions: A study on the state of the art and future research directions
    • R. Maes and I. Verbauwhede, "Physically unclonable functions: A study on the state of the art and future research directions," Hardw.-Intrinsic Secur., pp. 3-37, 2010.
    • (2010) Hardw.-Intrinsic Secur , pp. 3-37
    • Maes, R.1    Verbauwhede, I.2
  • 11
    • 68949175522 scopus 로고    scopus 로고
    • Power-up sram state as an identifying fingerprint and source of true Random Numbers
    • D. E. Holcomb, W. P. Burleson, and K. Fu, "Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers," Comput. IEEE Trans. On, vol. 58, no. 9, 2009.
    • (2009) Comput. IEEE Trans. on , vol.58 , Issue.9
    • Holcomb, D.E.1    Burleson, W.P.2    Fu, K.3
  • 15
    • 84903837858 scopus 로고    scopus 로고
    • Strong pufs: Models, constructions, and security proofs
    • A.-R. Sadeghi and D. Naccache, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg
    • U. Rührmair, H. Busch, and S. Katzenbeisser, "Strong PUFs: Models, Constructions, and Security Proofs," in Towards Hardware-Intrinsic Security, A.-R. Sadeghi and D. Naccache, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.
    • (2010) Towards Hardware-Intrinsic Security
    • Rührmair, U.1    Busch, H.2    Katzenbeisser, S.3
  • 17
    • 76949095784 scopus 로고    scopus 로고
    • Secure and robust error correction for physical unclonable functions
    • Jan
    • M.-D. (Mandel) Yu and S. Devadas, "Secure and Robust Error Correction for Physical Unclonable Functions," IEEE Des. Test Comput., vol. 27, no. 1, pp. 48-65, Jan. 2010.
    • (2010) IEEE Des. Test Comput , vol.27 , Issue.1 , pp. 48-65
    • Yu, M.-D.1    Devadas, S.2
  • 22
    • 78549250580 scopus 로고    scopus 로고
    • Hardware-based public-key cryptography with public physically unclonable functions
    • N. Beckmann and M. Potkonjak, "Hardware-based public-key cryptography with public physically unclonable functions," in Information Hiding, 2009.
    • (2009) Information Hiding
    • Beckmann, N.1    Potkonjak, M.2
  • 25
    • 55349112850 scopus 로고    scopus 로고
    • A tamper-proof and lightweight authentication scheme
    • Dec
    • G. Hammouri, E. Öztürk, and B. Sunar, "A tamper-proof and lightweight authentication scheme," Pervasive Mob. Comput., vol. 4, no. 6, pp. 807-818, Dec. 2008.
    • (2008) Pervasive Mob. Comput , vol.4 , Issue.6 , pp. 807-818
    • Hammouri, G.1    Öztürk, E.2    Sunar, B.3
  • 31
    • 50849138825 scopus 로고    scopus 로고
    • When AES blinks: Introducing optical side channel
    • J. Ferrigno and M. Hlaváč, "When AES blinks: introducing optical side channel," IET Inf. Secur., vol. 2, no. 3, p. 94, 2008.
    • (2008) IET Inf. Secur , vol.2 , Issue.3 , pp. 94
    • Ferrigno, J.1    Hlaváč, M.2
  • 33
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • May
    • O. Goldreich and R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs," J ACM, vol. 43, no. 3, May 1996.
    • (1996) J ACM , vol.43 , Issue.3
    • Goldreich, O.1    Ostrovsky, R.2
  • 37
    • 84883671628 scopus 로고    scopus 로고
    • Side channel modeling attacks on 65nm arbiter pufs exploiting cmos device noise
    • J. Delvaux and I. Verbauwhede, "Side Channel Modeling Attacks on 65nm Arbiter PUFs Exploiting CMOS Device Noise," Hardw.-Oriented Secur. Trust HOST 2013, 2013.
    • (2013) Hardw.-Oriented Secur. Trust HOST 2013
    • Delvaux, J.1    Verbauwhede, I.2
  • 39
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote use authentication scheme using smart cards
    • H.-M. Sun, "An efficient remote use authentication scheme using smart cards," Consum. Electron. IEEE Trans. On, vol. 46, no. 4, pp. 958-961, 2000.
    • (2000) Consum. Electron IEEE Trans. on , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.-M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.