메뉴 건너뛰기




Volumn 8731, Issue , 2014, Pages 451-475

Secure lightweight entity authentication with strong PUFs: Mission impossible?

Author keywords

Entity authentication; Lightweight; Physically unclonable function

Indexed keywords

AUTHENTICATION; INTEGRATED CIRCUITS; RADIO SYSTEMS; EMBEDDED SYSTEMS;

EID: 84921533958     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-44709-3_25     Document Type: Article
Times cited : (58)

References (24)
  • 2
    • 84901277586 scopus 로고    scopus 로고
    • Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation
    • Springer, Heidelberg
    • Delvaux, J., Verbauwhede, I.: Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 106–131. Springer, Heidelberg (2014)
    • (2014) In: Benaloh, J. (ed.) CT-RSA 2014. LNCS , vol.8366 , pp. 106-131
    • Delvaux, J.1    Verbauwhede, I.2
  • 3
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM J. Comput. 38(1), 97– 139 (2008)
    • (2008) SIAM J. Comput , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 7
    • 38049015807 scopus 로고    scopus 로고
    • FPGA Intrinsic PUFs and Their Use for IP Protection
    • In: Paillier, P., Verbauwhede, I. (eds.), Springer, Heidelberg
    • Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63–80. Springer, Heidelberg (2007)
    • (2007) CHES 2007. LNCS, vol , vol.4727 , pp. 63-80
    • Guajardo, J.1    Kumar, S.S.2    Schrijen, G.-J.3    Tuyls, P.4
  • 9
    • 68949175522 scopus 로고    scopus 로고
    • Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers. IEEE Trans
    • Holcomb, D.E., Burleson, W.P., Fu, K.: Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers. IEEE Trans. Computers 58(9) (2009)
    • (2009) Computers 58(9)
    • Holcomb, D.E.1    Burleson, W.P.2    Fu, K.3
  • 10
    • 84874047126 scopus 로고    scopus 로고
    • Machine Learning Attacks on 65nm Arbiter PUFs: Accurate Modeling poses strict Bounds on Usability
    • (December 2012)
    • Hospodar, G., Maes, R., Verbauwhede, I.: Machine Learning Attacks on 65nm Arbiter PUFs: Accurate Modeling poses strict Bounds on Usability. In: IEEE Workshop on Information Forensics and Security (WIFS) 2012, pp. 37–42 (December 2012)
    • (2012) IEEE Workshop on Information Forensics and Security (WIFS) , pp. 37-42
    • Hospodar, G.1    Maes, R.2    Verbauwhede, I.3
  • 12
    • 84863085630 scopus 로고    scopus 로고
    • Converse PUF-Based Authentication
    • In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.), Springer, Heidelberg
    • Kocabaş, Ü., Peter, A., Katzenbeisser, S., Sadeghi, A.-R.: Converse PUF-Based Authentication. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 142–158. Springer, Heidelberg (2012)
    • (2012) Trust 2012. LNCS , vol.7344 , pp. 142-158
    • Kocabaş, Ü.1    Peter, A.2    Katzenbeisser, S.3    Sadeghi, A.-R.4
  • 13
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication applications
    • (June 2004)
    • Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: 2004 Symposium on VLSI Circuits, pp. 176–179 (June 2004)
    • (2004) Symposium on VLSI Circuits , pp. 176-179
    • Lee, J.W.1    Lim, D.2    Gassend, B.3    Suh, G.E.4    Van Dijk, M.5    Devadas, S.6
  • 18
    • 3242749566 scopus 로고    scopus 로고
    • Physical One-Way Functions
    • Pappu, R.: Physical One-Way Functions. PhD Thesis, MIT, ch. 9 (2001)
    • (2001) PhD Thesis, MIT, ch , pp. 9
    • Pappu, R.1
  • 19
    • 80052007887 scopus 로고    scopus 로고
    • Reliable and Efficient PUF-Based Key Generation Using Pattern Matching
    • Paral, Z., Devadas, S.: Reliable and Efficient PUF-Based Key Generation Using Pattern Matching. In: Hardware-Oriented Security and Trust, HOST 2011, pp. 128–133 (June 2011)
    • (2011) Hardware-Oriented Security and Trust, HOST 2011 , pp. 128-133
    • Paral, Z.1    Devadas, S.2
  • 23
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference, DAC 2007, pp. 9– 14 (June 2007)
    • (2007) Design Automation Conference, DAC 2007 , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 24
    • 84865824388 scopus 로고    scopus 로고
    • Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs
    • In: Keromytis, A.D. (ed.), Springer, Heidelberg
    • Van Herrewege, A., Katzenbeisser, S., Maes, R., Peeters, R., Sadeghi, A.-R., Verbauwhede, I., Wachsmann, C.: Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 374–389. Springer, Heidelberg (2012)
    • (2012) FC 2012. LNCS, vol , vol.7397 , pp. 374-389
    • Van Herrewege, A.1    Katzenbeisser, S.2    Maes, R.3    Peeters, R.4    Sadeghi, A.-R.5    Verbauwhede, I.6    Wachsmann, C.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.