-
1
-
-
80051967839
-
A formal foundation for the security features of physical functions
-
Armknecht F, Maes R, Sadeghi A-R, Standaert F-X, Wachsmann C (2011) A formal foundation for the security features of physical functions. IEEE Security and Privacy 2011(1):16
-
(2011)
IEEE Security and Privacy
, vol.2011
, Issue.1
, pp. 16
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.-R.3
Standaert, F.-X.4
Wachsmann, C.5
-
3
-
-
49049105769
-
Design and implementation of puf-based unclonable" rfid ics for anti-counterfeiting and security applications
-
April 2008
-
Devadas S, Suh E, Paral S, Sowell R, Ziola T, Khandelwal V (2008) Design and implementation of puf-based "unclonable" rfid ics for anti-counterfeiting and security applications. In: IEEE international conference on RFID 2008, pp 58-64, April 2008
-
(2008)
IEEE International Conference on RFID 2008
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
4
-
-
0038341105
-
Silicon physical random functions
-
ACM, New York, NY, USA
-
Gassend B, Clarke D, van Dijk M, Devadas S (2002) Silicon physical random functions. In: Proceedings of the 9th ACMconference on computer and communications security, CCS 2002. ACM, New York, NY, USA, pp 148-160
-
(2002)
Proceedings of the 9th ACMconference on Computer and Communications Security, CCS 2002
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
5
-
-
38049015807
-
Fpga intrinsic pufs and their use for ip protection
-
Springer Berlin, Heidelberg
-
Guajardo J, Kumar S, Schrijen G-J, Tuyls P (2007) Fpga intrinsic pufs and their use for ip protection. In: Proceedings of the 9th international workshop on cryptographic hardware and embedded systems, CHES 2007. Springer, Berlin, Heidelberg, pp 63-80
-
(2007)
Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2007
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.-J.3
Tuyls, P.4
-
6
-
-
51749089495
-
Brand and ip protection with physical unclonable functions
-
May 2008
-
Guajardo J, Kumar S, Schrijen G-J, Tuyls P (2008) Brand and ip protection with physical unclonable functions. In: IEEE international symposium on circuits and systems, ISCAS 2008, pp 3186-3189, May 2008
-
(2008)
IEEE International Symposium on Circuits and Systems, ISCAS 2008
, pp. 3186-3189
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.-J.3
Tuyls, P.4
-
7
-
-
70350741520
-
A physical unclonable function defined using power distribution system equivalent resistance variations
-
ACM, New York, NY, USA
-
Helinski R, Acharyya D, Plusquellic J (2009) A physical unclonable function defined using power distribution system equivalent resistance variations. In: Proceedings of the 46th annual design automation conference, DAC. ACM, New York, NY, USA pp 676-681
-
(2009)
Proceedings of the 46th Annual Design Automation Conference, DAC
, pp. 676-681
-
-
Helinski, R.1
Acharyya, D.2
Plusquellic, J.3
-
8
-
-
79951741378
-
Quantitative and statistical performance evaluation of arbiter physical unclonable functions on fpgas
-
Dec 2010
-
Hori Y, Yoshida T, Katashita T, Satoh A (2010) Quantitative and statistical performance evaluation of arbiter physical unclonable functions on fpgas. In: International conference on reconfigurable computing and FPGAs (ReConFig) 2010, pp 298-303, Dec 2010
-
(2010)
International Conference on Reconfigurable Computing and FPGAs (ReConFig)
, vol.2010
, pp. 298-303
-
-
Hori, Y.1
Yoshida, T.2
Katashita, T.3
Satoh, A.4
-
9
-
-
80053482200
-
Mecca: A robust low-overhead puf using embedded memory array
-
Springer, Berlin, Heidelberg
-
Krishna AR, Narasimhan S, Wang X, Wang X Mecca: a robust low-overhead puf using embedded memory array. In: Proceedings of the 13th international conference on Cryptographic hardware and embedded systems, CHES 2011. Springer, Berlin, Heidelberg, pp 407-420
-
Proceedings of the 13th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2011
, pp. 407-420
-
-
Krishna, A.R.1
Narasimhan, S.2
Wang, X.3
Wang, X.4
-
10
-
-
51849144293
-
Extended abstract: The butterfly puf protecting ip on every fpga
-
Kumar S, Guajardo J, Maes R, Schrijen G-J, Tuyls P (2008) Extended abstract: The butterfly puf protecting ip on every fpga. In: IEEE international workshop on Hardware-oriented security and trust, HOST 2008, pp 67-70
-
(2008)
IEEE International Workshop on Hardware-oriented Security and Trust, HOST 2008
, pp. 67-70
-
-
Kumar, S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.-J.4
Tuyls, P.5
-
11
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Lim D, Lee J, Gassend B, Suh G, van Dijk M, Devadas S (2005) Extracting secret keys from integrated circuits. IEEE Trans Very Large Scale Integration Syst 13(10):1200-1205
-
(2005)
IEEE Trans Very Large Scale Integration Syst
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.2
Gassend, B.3
Suh, G.4
Van Dijk, M.5
Devadas, S.6
-
14
-
-
85016215043
-
Physically unclonable functions: A study on the state of the art andfuture research directions
-
Springer, New York
-
Maes R, Verbauwhede I (2010) Physically unclonable functions: A study on the state of the art andfuture research directions. In: Towards hardware-intrinsic security. Springer, New York
-
(2010)
Towards Hardware-intrinsic Security
-
-
Maes, R.1
Verbauwhede, I.2
-
15
-
-
77955766025
-
A large scale characterization of ropuf
-
Maiti A, Casarona J, McHale L, Schaumont P (2010) A large scale characterization of ropuf. In: IEEE international symposium on hardware-oriented security and trust (HOST) 2010, pp 94-99
-
(2010)
IEEE International Symposium on Hardware-oriented Security and Trust (HOST)
, vol.2010
, pp. 94-99
-
-
Maiti, A.1
Casarona, J.2
McHale, L.3
Schaumont, P.4
-
17
-
-
77951259594
-
An analysis of delay based puf implementations on fpga
-
Sirisuk P, Morgan F, El-Ghazawi T, Amano H (eds Springer, Berlin
-
Morozov S, Maiti A, Schaumont P (2010) An analysis of delay based puf implementations on fpga. In: Sirisuk P, Morgan F, El-Ghazawi T, Amano H (eds) Reconfigurable computing: architectures, tools and applications of lecture notes in computer science, vol 5992. Springer, Berlin, pp 382-387
-
(2010)
Reconfigurable Computing: Architectures, Tools and Applications of Lecture Notes in Computer Science
, vol.5992
, pp. 382-387
-
-
Morozov, S.1
Maiti, A.2
Schaumont, P.3
-
19
-
-
85008008223
-
A digital 1.6 pj/bit chip identification circuit using process variations
-
Su Y, Holleman J, Otis B (2008) A digital 1.6 pj/bit chip identification circuit using process variations. IEEE J Solid-State Circ 43(1):69-77
-
(2008)
IEEE J Solid-State Circ
, vol.43
, Issue.1
, pp. 69-77
-
-
Su, Y.1
Holleman, J.2
Otis, B.3
-
20
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
ACM New York, NY, USA
-
Suh GE, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th annual design automation conference, DAC 2007. ACM, New York, NY, USA, pp 9-14
-
(2007)
Proceedings of the 44th Annual Design Automation Conference, DAC 2007
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
21
-
-
78049343605
-
The glitch puf: A new delay-puf architecture exploiting glitch shapes
-
Springer, Berlin, Heidelberg
-
Suzuki D, Shimizu K (2010) The glitch puf: a new delay-puf architecture exploiting glitch shapes. In: Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, CHES 2010. Springer, Berlin, Heidelberg, pp 366-382
-
(2010)
Proceedings of the 12th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2010
, pp. 366-382
-
-
Suzuki, D.1
Shimizu, K.2
-
22
-
-
33750726983
-
Readproof hardware from protective coatings
-
Springer, New York
-
Tuyls P, Schrijen G-J, Skoríc B, van Geloven J, Verhaegh N, Wolters R (2006) Readproof hardware from protective coatings. In: Cryptographic hardware and embedded systems workshop of LNCS, vol 4249. Springer, New York, pp 369-383
-
(2006)
Cryptographic Hardware and Embedded Systems Workshop of LNCS
, vol.4249
, pp. 369-383
-
-
Tuyls, P.S.1
-
23
-
-
78650185683
-
Hardware intrinsic security from d flip-flops
-
ACM, New York, NY, USA
-
van der Leest V, Schrijen G-J, Handschuh H, Tuyls P (2010) Hardware intrinsic security from d flip-flops. In: Proceedings of the fifth ACM workshop on Scalable trusted computing, STC 2010. ACM, New York, NY, USA, pp 53-62
-
(2010)
Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing, STC 2010
, pp. 53-62
-
-
Van Der Leest, V.1
Schrijen, G.-J.2
Handschuh, H.3
Tuyls, P.4
-
24
-
-
85192422573
-
-
Yamamoto D, Sakiyama K, Iwamoto M, Ohta K, Ochiai T, Takenaka M, Itoh K Variety enhancement of puf responses based on the locations of random outputting rs latches. http://www. iacr.org/workshops/ches/ches2011/presentations/Session%208/CHES2011 Session8 3.pdf
-
Variety Enhancement of Puf Responses Based on the Locations of Random Outputting Rs Latches
-
-
Yamamoto, D.1
Sakiyama, K.2
Iwamoto, M.3
Ohta, K.4
Ochiai, T.5
Takenaka, M.6
Itoh, K.7
-
25
-
-
80053522708
-
Uniqueness enhancement of puf responses based on the locations of random outputting rs latches
-
Springer, Berlin, Heidelberg
-
Yamamoto D, Sakiyama K, Iwamoto M, Ohta K, Ochiai T, Takenaka M, Itoh K (2011) Uniqueness enhancement of puf responses based on the locations of random outputting rs latches. In: Proceedings of the 13th international conference on Cryptographic hardware and embedded systems, CHES 2011. Springer, Berlin, Heidelberg, pp 390-406
-
(2011)
Proceedings of the 13th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2011
, pp. 390-406
-
-
Yamamoto, D.1
Sakiyama, K.2
Iwamoto, M.3
Ohta, K.4
Ochiai, T.5
Takenaka, M.6
Itoh, K.7
|