메뉴 건너뛰기




Volumn 9781461450405, Issue , 2013, Pages 1-270

Physical unclonable functions in theory and practice

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; HARDWARE SECURITY; MICROELECTRONICS; PRINTED CIRCUIT DESIGN;

EID: 84930022687     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4614-5040-5     Document Type: Book
Times cited : (187)

References (171)
  • 2
    • 37249034179 scopus 로고    scopus 로고
    • The impact of random device variation on sram cell stability in sub-90-nm cmos technologies
    • Agarwal K, Nassif S (2008) The impact of random device variation on sram cell stability in sub-90-nm cmos technologies. IEEE Trans Very Large Scale Integr Syst 16(1): 86-97. DOI 10.1109/TVLSI.2007.909792
    • (2008) IEEE Trans Very Large Scale Integr Syst , vol.16 , Issue.1 , pp. 86-97
    • Agarwal, K.1    Nassif, S.2
  • 5
    • 77955759569 scopus 로고    scopus 로고
    • Attack resistant sense amplifier based pufs (sa-puf) with deterministic and controllable reliability of puf responses
    • 2010
    • Bhargava M, Cakir C, Mai K (2010) Attack resistant sense amplifier based pufs (sa-puf) with deterministic and controllable reliability of puf responses. In: 2010 IEEE international symposium on hardware-oriented security and trust (HOST), pp 106-111, 2010. DOI 10.1109/HST.2010.5513106
    • (2010) 2010 IEEE International Symposium on Hardware-oriented Security and Trust (HOST) , pp. 106-111
    • Bhargava, M.1    Cakir, C.2    Mai, K.3
  • 12
    • 79952190065 scopus 로고    scopus 로고
    • Integrated circuit design for physical unclonable function using differential amplifiers
    • Choi BD, Kim TW, Lee MK, Chung KS, Kim D (2010) Integrated circuit design for physical unclonable function using differential amplifiers. Analog integrated circuits and signal processing, pp 1-8. URL http://dx.doi.org/10.1007/s10470-010-9563-8, 10.1007/s10470-010-9563-8
    • (2010) Analog Integrated Circuits and Signal Processing , pp. 1-8
    • Choi, B.D.1    Kim, T.W.2    Lee, M.K.3    Chung, K.S.4    Kim, D.5
  • 19
    • 4344584084 scopus 로고    scopus 로고
    • Master's thesis, Massachusetts Institute of Technology, The Stata Center, 32 Vassar Street, Cambridge, Massachusetts 02139
    • Gassend B (2003) Physical random functions. Master's thesis, Massachusetts Institute of Technology, The Stata Center, 32 Vassar Street, Cambridge, Massachusetts 02139
    • (2003) Physical Random Functions
    • Gassend, B.1
  • 21
    • 38049015807 scopus 로고    scopus 로고
    • Fpga intrinsic pufs and their use for ip protection
    • Paillier P, Verbauwhede I (eds) Lecture notes in computer science, vol 4727. Springer, Berlin
    • Guajardo J, Kumar S, Schrijen GJ, Tuyls P (2007) Fpga intrinsic pufs and their use for ip protection. In: Paillier P, Verbauwhede I (eds) Cryptographic hardware and embedded systems-CHES 2007. Lecture notes in computer science, vol 4727. Springer, Berlin, pp 63-80, URL http://dx.doi.org/10.1007/978-3-540-74735-2-5
    • (2007) Cryptographic Hardware and Embedded Systems-CHES 2007 , pp. 63-80
    • Guajardo, J.1    Kumar, S.2    Schrijen, G.J.3    Tuyls, P.4
  • 22
    • 62449274873 scopus 로고    scopus 로고
    • Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
    • Guajardo J, kori B, Tuyls P, Kumar S, Bel T, Blom A, Schrijen GJ (2009) Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions. Inform Syst Front 11: 19-41, URL http://dx.doi.org/10.1007/s10796-008-9142-z, 10.1007/s10796-008-9142-z
    • (2009) Inform Syst Front , vol.11 , pp. 19-41
    • Guajardo, J.1    Kori, B.2    Tuyls, P.3    Kumar, S.4    Bel, T.5    Blom, A.6    Schrijen, G.J.7
  • 23
    • 35048818581 scopus 로고    scopus 로고
    • Comparing elliptic curve cryptography and rsa on 8-bit cpus
    • Joye M, Quisquater JJ (eds) Lecture notes in computer science, vol 3156. Springer, Berlin
    • Gura N, Patel A, Wander A, Eberle H, Shantz SC (2004) Comparing elliptic curve cryptography and rsa on 8-bit cpus. In: Joye M, Quisquater JJ (eds) Cryptographic hardware and embedded systems - CHES 2004. Lecture notes in computer science, vol 3156. Springer, Berlin, pp 925-943
    • (2004) Cryptographic Hardware and Embedded Systems - CHES 2004 , pp. 925-943
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 25
    • 70350741520 scopus 로고    scopus 로고
    • A physical unclonable function defined using power distribution system equivalent resistance variations
    • ACM, New York, DAC'09 URL http://doi.acm.org/10.1145/1629911.1630089
    • Helinski R, Acharyya D, Plusquellic J (2009) A physical unclonable function defined using power distribution system equivalent resistance variations. In: Proceedings of the 46th annual design automation conference. ACM, New York, DAC'09, pp 676-681, DOI http://doi.acm.org/10.1145/1629911.1630089, URL http://doi.acm.org/10.1145/1629911.1630089
    • (2009) Proceedings of the 46th Annual Design Automation Conference , pp. 676-681
    • Helinski, R.1    Acharyya, D.2    Plusquellic, J.3
  • 26
    • 33846922353 scopus 로고    scopus 로고
    • Chip identification using the characteristic dispersion of transistor
    • Hirase J, Furukawa T (2005) Chip identification using the characteristic dispersion of transistor. In: Proceedings 14th Asian test symposium, pp 188-193, DOI 10.1109/ATS.2005.35
    • (2005) Proceedings 14th Asian Test Symposium , pp. 188-193
    • Hirase, J.1    Furukawa, T.2
  • 27
    • 50249134033 scopus 로고    scopus 로고
    • Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
    • Holcomb DE, Burleson WP, Fu K (2007) Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Proceedings of the conference on RFID security, URL http://www.cs.umass.edu/~kevinfu/papers/holcomb-FERNS-RFIDSec07.pdf
    • (2007) Proceedings of the Conference on RFID Security
    • Holcomb, D.E.1    Burleson, W.P.2    Fu, K.3
  • 28
    • 68949175522 scopus 로고    scopus 로고
    • Power-up SRAM state as an identifying fingerprint and source of true random numbers
    • Holcomb DE, Burleson WP, Fu K (2009) Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans Comput 58(9): 1198-1210, URL http://www.cs.umass.edu/~kevinfu/papers/holcomb-FERNS-IEEE-Computers.pdf
    • (2009) IEEE Trans Comput , vol.58 , Issue.9 , pp. 1198-1210
    • Holcomb, D.E.1    Burleson, W.P.2    Fu, K.3
  • 31
    • 0002326595 scopus 로고    scopus 로고
    • Biometric identification
    • Jain HLPS A (2000) Biometric identification. Commun ACM 43(2): 91-98, DOI 10.1145/328236.328110, URL http://helios.et.put.poznan.pl/~dgajew/download/PUT/SEMESTR-10/IO/FACE-RECOGNITION/BiometricsACM.pdf
    • (2000) Commun ACM , vol.43 , Issue.2 , pp. 91-98
  • 36
    • 80052597050 scopus 로고    scopus 로고
    • Design of unique and reliable physically unclonable functions based on current starved inverter chain
    • 2011
    • Kumar R, Patil VC, Kundu S (2011) Design of unique and reliable physically unclonable functions based on current starved inverter chain. In: IEEE computer society annual symposium on VLSI (ISVLSI), pp 224-229, 2011. DOI 10.1109/ISVLSI.2011.82
    • (2011) IEEE Computer Society Annual Symposium on VLSI (ISVLSI) , pp. 224-229
    • Kumar, R.1    Patil, V.C.2    Kundu, S.3
  • 39
    • 4544381402 scopus 로고    scopus 로고
    • A technique to build a secret key in integrated circuits for identification and authentication applications
    • Digest of technical papers
    • Lee J, Lim D, Gassend B, Suh G, van Dijk M, Devadas S (2004) A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium on VLSI circuits, 2004. Digest of technical papers, pp 176-179. DOI 10.1109/VL-SIC.2004.1346548
    • (2004) Symposium on VLSI Circuits, 2004 , pp. 176-179
    • Lee, J.1    Lim, D.2    Gassend, B.3    Suh, G.4    Van Dijk, M.5    Devadas, S.6
  • 43
  • 48
    • 85016215043 scopus 로고    scopus 로고
    • Physically unclonable functions: A study on the state of the art and future research directions
    • Basin D, Maurer U, Sadeghi AR, Naccache D (eds) Springer, Berlin
    • Maes R, Verbauwhede I (2010) Physically unclonable functions: A study on the state of the art and future research directions. In: Basin D, Maurer U, Sadeghi AR, Naccache D (eds) Towards hardware-intrinsic security, information security and cryptography. Springer, Berlin, pp 3-37, URL http://dx.doi.org/10.1007/978-3-642-14452-3-1
    • (2010) Towards Hardware-intrinsic Security, Information Security and Cryptography , pp. 3-37
    • Maes, R.1    Verbauwhede, I.2
  • 50
    • 70449794558 scopus 로고    scopus 로고
    • Improving the quality of a physical unclonable function using configurable ring oscillators
    • 2009. FPL 2009
    • Maiti A, Schaumont P (2009) Improving the quality of a physical unclonable function using configurable ring oscillators. In: International conference on field programmable logic and applications, 2009. FPL 2009, pp 703-707. DOI 10.1109/FPL.2009.5272361
    • (2009) International Conference on Field Programmable Logic and Applications , pp. 703-707
    • Maiti, A.1    Schaumont, P.2
  • 51
    • 80053529160 scopus 로고    scopus 로고
    • Improved ring oscillator puf: An fpga-friendly secure primitive
    • Maiti A, Schaumont P (2010) Improved ring oscillator puf: An fpga-friendly secure primitive. J Cryptol 1-23
    • (2010) J Cryptol , pp. 1-23
    • Maiti, A.1    Schaumont, P.2
  • 53
    • 80053548561 scopus 로고    scopus 로고
    • Fpga-based true random number generation using circuit metastability with adaptive feedback control
    • Majzoobi M, Koushanfar F, Devadas S (2011) Fpga-based true random number generation using circuit metastability with adaptive feedback control. In: CHES, pp 17-32
    • (2011) CHES , pp. 17-32
    • Majzoobi, M.1    Koushanfar, F.2    Devadas, S.3
  • 56
    • 0003508568 scopus 로고    scopus 로고
    • (visited Sep 23, 2012)
    • Mehuron W (1999) Data encryption standard (des). URL http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf (visited Sep 23, 2012)
    • (1999) Data Encryption Standard (des)
    • Mehuron, W.1
  • 57
    • 70350679379 scopus 로고    scopus 로고
    • (visited Sep 23, 2012)
    • NSA (2009) The case for elliptic curve cryptography. URL http://www.nsa.gov/business/programs/elliptic-curve.shtml (visited Sep 23, 2012)
    • (2009) The Case for Elliptic Curve Cryptography
  • 61
    • 0009553549 scopus 로고    scopus 로고
    • Protecting devices by active coating
    • Posch R (1998) Protecting devices by active coating. J Universal Comput Sci 4(7): 652-668
    • (1998) J Universal Comput Sci , vol.4 , Issue.7 , pp. 652-668
    • Posch, R.1
  • 64
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • URL http://doi.acm.org/10.1145/359340.359342
    • Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21: 120-126, DOI http://doi.acm.org/10.1145/359340.359342, URL http://doi.acm.org/10.1145/359340.359342
    • (1978) Commun ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 66
    • 59849094470 scopus 로고    scopus 로고
    • Comb capacitor structures for on-chip physical uncloneable function
    • Roy D, Klootwijk J, Verhaegh N, Roosen H, Wolters R (2009) Comb capacitor structures for on-chip physical uncloneable function. IEEE Trans Semicond Manuf 22(1): 96-102. DOI 10.1109/TSM.2008.2010738
    • (2009) IEEE Trans Semicond Manuf , vol.22 , Issue.1 , pp. 96-102
    • Roy, D.1    Klootwijk, J.2    Verhaegh, N.3    Roosen, H.4    Wolters, R.5
  • 69
    • 33746785063 scopus 로고    scopus 로고
    • Information-theoretic analysis of capacitive physical unclonable functions
    • Skoric B, Maubach S, Kevenaar T, Tuyls P (2006) Information-theoretic analysis of capacitive physical unclonable functions. J Appl Phys 100(2). DOI 10.1063/1.2209532
    • (2006) J Appl Phys , vol.100 , Issue.2
    • Skoric, B.1    Maubach, S.2    Kevenaar, T.3    Tuyls, P.4
  • 72
    • 79957637413 scopus 로고    scopus 로고
    • Cmos silicon physical unclonable functions based on intrinsic process variability
    • Stanzione S, Puntin D, Iannaccone G (2011) Cmos silicon physical unclonable functions based on intrinsic process variability. IEEE J Solid State Circ PP(99): 1. DOI 10.1109/JSSC.2011.2120650
    • (2011) IEEE J Solid State Circ , vol.PP , Issue.99 , pp. 1
    • Stanzione, S.1    Puntin, D.2    Iannaccone, G.3
  • 73
    • 85008008223 scopus 로고    scopus 로고
    • A digital 1.6 pj/bit chip identification circuit using process variations
    • Su Y, Holleman J, Otis B (2008) A digital 1.6 pj/bit chip identification circuit using process variations. IEEE J Solid State Circ 43(1): 69-77. DOI 10.1109/JSSC.2007.910961
    • (2008) IEEE J Solid State Circ , vol.43 , Issue.1 , pp. 69-77
    • Su, Y.1    Holleman, J.2    Otis, B.3
  • 75
    • 78049343605 scopus 로고    scopus 로고
    • The glitch puf: A new delay-puf architecture exploiting glitch shapes
    • Mangard S, Standaert FX (eds) Lecture notes in computer science, vol 6225. Springer, Berlin
    • Suzuki D, Shimizu K (2010) The glitch puf: A new delay-puf architecture exploiting glitch shapes. In: Mangard S, Standaert FX (eds) Cryptographic hardware and embedded systems, CHES 2010. Lecture notes in computer science, vol 6225. Springer, Berlin, pp 366-382, URL http://dx.doi.org/10.1007/978-3-642-15031-9-25, 10.1007/978-3-642-15031-9-25
    • (2010) Cryptographic Hardware and Embedded Systems, CHES 2010 , pp. 366-382
    • Suzuki, D.1    Shimizu, K.2
  • 79
    • 34547674038 scopus 로고    scopus 로고
    • Springer, Berlin; chap Secret Key Generation from Classical Physics Philips Research Book Series
    • Tuyls P, Škorić B (2005) AmIware: hardware technology drivers of ambient intelligence. Springer, Berlin; chap Secret Key Generation from Classical Physics, pp 421-447. Philips Research Book Series
    • (2005) AmIware: Hardware Technology Drivers of Ambient Intelligence , pp. 421-447
    • Tuyls, P.1    Škorić, B.2
  • 91
    • 10244234065 scopus 로고    scopus 로고
    • Rfid technologies: Supply-chain applications and implementation issues
    • http://www.tandfonline.com/doi/pdf/10.1201/1078/44912.22.1.20051201/85739.7
    • Angeles R (2005) Rfid technologies: Supply-chain applications and implementation issues. Inform Syst Manag 22(1): 51-65, DOI 10.1201/1078/44912.22.1.20051201/85739.7, URL http://www.tandfonline.com/doi/abs/10.1201/1078/44912.22.1.20051201/85739.7, http://www.tandfonline.com/doi/pdf/10.1201/1078/44912.22.1.20051201/85739.7
    • (2005) Inform Syst Manag , vol.22 , Issue.1 , pp. 51-65
    • Angeles, R.1
  • 93
    • 84930035012 scopus 로고    scopus 로고
    • (visited Sep 23, 2012)
    • Bulgreen K (2010) Sildenafil tablets, URL http://www.pfizer.com/files/products/uspi-viagra.pdf (visited Sep 23, 2012)
    • (2010) Sildenafil Tablets
    • Bulgreen, K.1
  • 94
    • 49049105769 scopus 로고    scopus 로고
    • Design and implementation of puf-based "unclonable" rfid ics for anti-counterfeiting and security applications
    • 2008
    • Devadas S, Suh E, Paral S, Sowell R, Ziola T, Khandelwal V (2008) Design and implementation of puf-based "unclonable" rfid ics for anti-counterfeiting and security applications. In: IEEE international conference on RFID, pp 58-64, 2008. DOI 10.1109/RFID.2008.4519377
    • (2008) IEEE International Conference on RFID , pp. 58-64
    • Devadas, S.1    Suh, E.2    Paral, S.3    Sowell, R.4    Ziola, T.5    Khandelwal, V.6
  • 96
    • 84930031912 scopus 로고    scopus 로고
    • Digital video broadcasting (dvb); extensions to the common interface specification
    • (1999-11)
    • European Telecommunications Standards Institute (1999) Digital video broadcasting (dvb); extensions to the common interface specification. ETSI TS 101 699 V1.1.1 (1999-11)
    • (1999) ETSI TS 101 699 V1.1.1
    • European Telecommunications Standards Institute1
  • 98
    • 38049015807 scopus 로고    scopus 로고
    • Fpga intrinsic pufs and their use for ip protection
    • Paillier P, Verbauwhede I (eds) Lecture notes in computer science, vol 4727. Springer, Berlin
    • Guajardo J, Kumar S, Schrijen GJ, Tuyls P (2007) Fpga intrinsic pufs and their use for ip protection. In: Paillier P, Verbauwhede I (eds) Cryptographic hardware and embedded systems - CHES 2007. Lecture notes in computer science, vol 4727. Springer, Berlin, pp 63-80, URL http://dx.doi.org/10.1007/978-3-540-74735-2-5
    • (2007) Cryptographic Hardware and Embedded Systems - CHES 2007 , pp. 63-80
    • Guajardo, J.1    Kumar, S.2    Schrijen, G.J.3    Tuyls, P.4
  • 101
    • 62449274873 scopus 로고    scopus 로고
    • Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
    • Guajardo J (2009) Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions. Inform Syst Front 11: 19-41
    • (2009) Inform Syst Front , vol.11 , pp. 19-41
    • Guajardo, J.1
  • 102
    • 84930037341 scopus 로고    scopus 로고
    • (visited Sep 23, 2012)
    • HavocscopeLLC (2011) Counterfeit goods ranking. URL http://www.havocscope.com/black-market/counterfeit-goods/counterfeit-goods-ranking/ (visited Sep 23, 2012)
    • (2011) Counterfeit Goods Ranking
  • 105
    • 84889975404 scopus 로고    scopus 로고
    • From identification to authentication - A review of rfid product authentication techniques
    • Ranasinghe DC, Cole PH (eds) Springer, Berlin
    • Lehtonen M, Staake T, Michahelles F (2008) From identification to authentication - a review of rfid product authentication techniques. In: Ranasinghe DC, Cole PH (eds) Networked RFID systems and lightweight cryptography. Springer, Berlin, pp 169-187
    • (2008) Networked RFID Systems and Lightweight Cryptography , pp. 169-187
    • Lehtonen, M.1    Staake, T.2    Michahelles, F.3
  • 106
    • 80755168368 scopus 로고    scopus 로고
    • On the vulnerability of fpga bitstream encryption against power analysis attacks
    • Moradi A, Barenghi A, Kasper T, Paar C (2011) On the vulnerability of fpga bitstream encryption against power analysis attacks. Memory Rep 201: 111-123, URL http://eprint.iacr.org/2011/390
    • (2011) Memory Rep , vol.201 , pp. 111-123
    • Moradi, A.1    Barenghi, A.2    Kasper, T.3    Paar, C.4
  • 107
    • 85032397604 scopus 로고    scopus 로고
    • On the portability of side-channel attacks
    • Moradi A, Kasper M, Paar C (2011) On the portability of side-channel attacks. Design Rep 201: 5-7, URL http://eprint.iacr.org/2011/391
    • (2011) Design Rep , vol.201 , pp. 5-7
    • Moradi, A.1    Kasper, M.2    Paar, C.3
  • 111
    • 84930036708 scopus 로고    scopus 로고
    • IZ-N SD, Strasse 10, Objekt 48, A-2355 Wiener Neudorf
    • Securikett (2011) Securikett online image katalog. http://www.securikett.com, IZ-N SD, Strasse 10, Objekt 48, A-2355 Wiener Neudorf
    • (2011) Securikett Online Image Katalog
  • 112
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon C (1949) Communication theory of secrecy systems, Bell Syst Tech J 28: 655-715
    • (1949) Bell Syst Tech J , vol.28 , pp. 655-715
    • Shannon, C.1
  • 113
    • 33750702480 scopus 로고    scopus 로고
    • Offline hardware/software authentication for reconfigurable platforms
    • Goubin L, Matsui M (eds) Proceedings of the 8th international workshop. (Lecture notes in computer science, Vol. 4249). Springer, Berlin Cryptographic Hardware and Embedded Systems-CHES 2006. 8th International Workshop. Proceedings, 10-13 October 2006, Yokohama, Japan
    • Simpson E, Schaumont P (2006) Offline hardware/software authentication for reconfigurable platforms. In: Goubin L, Matsui M (eds) Cryptographic hardware and embedded systems-CHES 2006. Proceedings of the 8th international workshop. (Lecture notes in computer science, Vol. 4249). Springer, Berlin, pp 311-323, Cryptographic Hardware and Embedded Systems-CHES 2006. 8th International Workshop. Proceedings, 10-13 October 2006, Yokohama, Japan
    • (2006) Cryptographic Hardware and Embedded Systems-CHES 2006 , pp. 311-323
    • Simpson, E.1    Schaumont, P.2
  • 114
    • 32844471136 scopus 로고    scopus 로고
    • An introduction to rfid technology
    • Want R (2006) An introduction to rfid technology. IEEE Pervasive Comput 5(1): 25-33. DOI 10.1109/MPRV.2006.2
    • (2006) IEEE Pervasive Comput , vol.5 , Issue.1 , pp. 25-33
    • Want, R.1
  • 116
    • 4344587804 scopus 로고    scopus 로고
    • Identification and authentication of integrated circuits
    • Gassend B, Lim D, Clarke D, Dijk MV, Devadas S (2004) Identification and authentication of integrated circuits. Concurr Comput Pract Exper 16: 1077-1098. DOI 10.1002/cpe.805, URL http://www.cse.msstate.edu/~ramkumar/fulltext.pdf
    • (2004) Concurr Comput Pract Exper , vol.16 , pp. 1077-1098
    • Gassend, B.1    Lim, D.2    Clarke, D.3    Dijk, M.V.4    Devadas, S.5
  • 118
    • 85032410864 scopus 로고    scopus 로고
    • Identifikation, authentifizierung und schluesselgenerierung mittels physical unclonable functions
    • Hofer M, Boehm C (2010) Identifikation, authentifizierung und schluesselgenerierung mittels physical unclonable functions. In: Informationstagung Mikroelektronik ME2010, pp 267-272
    • (2010) Informationstagung Mikroelektronik ME2010 , pp. 267-272
    • Hofer, M.1    Boehm, C.2
  • 124
    • 77956203762 scopus 로고    scopus 로고
    • Quality metric evaluation of a physical unclonable function derived from an ic's power distribution system
    • 2010
    • Helinski R, Acharyya D, Plusquellic J (2010) Quality metric evaluation of a physical unclonable function derived from an ic's power distribution system. In: 47th ACM/IEEE design automation conference (DAC), pp 240-243, 2010
    • (2010) 47th ACM/IEEE Design Automation Conference (DAC) , pp. 240-243
    • Helinski, R.1    Acharyya, D.2    Plusquellic, J.3
  • 126
    • 85016215043 scopus 로고    scopus 로고
    • Physically unclonable functions: A study on the state of the art and future research directions
    • Basin D, Maurer U, Sadeghi AR, Naccache D (eds) Springer, Berlin 2010
    • Maes R, Verbauwhede I (2010) Physically unclonable functions: A study on the state of the art and future research directions. In: Basin D, Maurer U, Sadeghi AR, Naccache D (eds) Towards hardware-intrinsic security, information security and cryptography. Springer, Berlin, pp 3-37, 2010, URL http://dx.doi.org/10.1007/978-3-642-14452-3-1
    • (2010) Towards Hardware-intrinsic Security, Information Security and Cryptography , pp. 3-37
    • Maes, R.1    Verbauwhede, I.2
  • 128
    • 79957637413 scopus 로고    scopus 로고
    • Cmos silicon physical unclonable functions based on intrinsic process variability
    • Stanzione S, Puntin D, Iannaccone G (2011) Cmos silicon physical unclonable functions based on intrinsic process variability. IEEE J Solid-State Circ PP(99): 1. DOI 10.1109/JSSC.2011.2120650
    • (2011) IEEE J Solid-State Circ , vol.PP , Issue.99 , pp. 1
    • Stanzione, S.1    Puntin, D.2    Iannaccone, G.3
  • 129
    • 85008008223 scopus 로고    scopus 로고
    • A digital 1.6 pj/bit chip identification circuit using process variations
    • Su Y, Holleman J, Otis B (2008) A digital 1.6 pj/bit chip identification circuit using process variations. IEEE J Solid-State Circ 43(1): 69-77. DOI 10.1109/JSSC.2007.910961
    • (2008) IEEE J Solid-State Circ , vol.43 , Issue.1 , pp. 69-77
    • Su, Y.1    Holleman, J.2    Otis, B.3
  • 131
    • 0036567024 scopus 로고    scopus 로고
    • Block error-correcting codes for systems with a very high ber: Theoretical analysis and application to the protection of watermarks
    • Desset C, Macq B, Vandendorpe L (2002) Block error-correcting codes for systems with a very high ber: Theoretical analysis and application to the protection of watermarks. Signal Process Image Commun 17: 409-421
    • (2002) Signal Process Image Commun , vol.17 , pp. 409-421
    • Desset, C.1    Macq, B.2    Vandendorpe, L.3
  • 132
    • 17744381820 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • 2007
    • Dodis Y (2007) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Proceedings of Eurocrypt 2007, pp 523-540, 2007
    • (2007) Proceedings of Eurocrypt 2007 , pp. 523-540
    • Dodis, Y.1
  • 134
    • 84943817322 scopus 로고
    • Error detecting and error correcting codes
    • Hamming R (1950) Error detecting and error correcting codes. Bell Syst Tech Syst 29: 147-160
    • (1950) Bell Syst Tech Syst , vol.29 , pp. 147-160
    • Hamming, R.1
  • 140
    • 0002947255 scopus 로고
    • A mathematical theory of communication
    • URL http://doi.acm.org/10.1145/584091.584093
    • Shannon CE (1948) A mathematical theory of communication. SIGMOBILE Mob Comput Commun Rev 5: 3-55. DOI http://doi.acm.org/10.1145/584091.584093, URL http://doi.acm.org/10.1145/584091.584093
    • (1948) SIGMOBILE Mob Comput Commun Rev , vol.5 , pp. 3-55
    • Shannon, C.E.1
  • 141
    • 85008008223 scopus 로고    scopus 로고
    • A digital 1.6 pj/bit chip identification circuit using process variations
    • Su Y, Holleman J, Otis B (2008) A digital 1.6 pj/bit chip identification circuit using process variations. IEEE J Solid State Circ 43(1): 69-77. DOI 10.1109/JSSC.2007.910961
    • (2008) IEEE J Solid State Circ , vol.43 , Issue.1 , pp. 69-77
    • Su, Y.1    Holleman, J.2    Otis, B.3
  • 143
    • 0042912833 scopus 로고    scopus 로고
    • Simulation of intrinsic parameter fluctuations in decananometer and nanometer-scale mosfets
    • Asenov A, Brown A, Davies J, Kaya S, Slavcheva G (2003) Simulation of intrinsic parameter fluctuations in decananometer and nanometer-scale mosfets. IEEE Trans Electron Dev 50(9): 1837-1852. DOI 10.1109/TED.2003.815862
    • (2003) IEEE Trans Electron Dev , vol.50 , Issue.9 , pp. 1837-1852
    • Asenov, A.1    Brown, A.2    Davies, J.3    Kaya, S.4    Slavcheva, G.5
  • 145
    • 84937650904 scopus 로고
    • Electromigration; a brief survey and some recent results
    • Black J (1969) Electromigration; a brief survey and some recent results. IEEE Trans Electron Dev 16(4): 338-347. DOI 10.1109/T-ED.1969.16754
    • (1969) IEEE Trans Electron Dev , vol.16 , Issue.4 , pp. 338-347
    • Black, J.1
  • 146
    • 0033307322 scopus 로고    scopus 로고
    • A comprehensive mosfet mismatch model
    • 1999. IEDM Technical Digest 1999
    • Drennan P, McAndrew C (1999) A comprehensive mosfet mismatch model. In: International electron devices meeting, 1999. IEDM Technical Digest, pp 167-170, 1999. DOI 10.1109/IEDM.1999.823871
    • (1999) International Electron Devices Meeting , pp. 167-170
    • Drennan, P.1    McAndrew, C.2
  • 147
    • 0037346346 scopus 로고    scopus 로고
    • Understanding mosfet mismatch for analog design
    • Drennan P, McAndrew C (2003) Understanding mosfet mismatch for analog design. IEEE J Solid State Circ 38(3): 450-456. DOI 10.1109/JSSC.2002.808305
    • (2003) IEEE J Solid State Circ , vol.38 , Issue.3 , pp. 450-456
    • Drennan, P.1    McAndrew, C.2
  • 149
    • 0022009168 scopus 로고
    • Hot-electron-induced mosfet degradation - Model, monitor, and improvement
    • Hu C, Tam SC, Hsu FC, Ko PK, Chan TY, Terrill K (1985) Hot-electron-induced mosfet degradation - model, monitor, and improvement. IEEE J Solid State Circ 20(1): 295-305. DOI 10.1109/JSSC.1985.1052306
    • (1985) IEEE J Solid State Circ , vol.20 , Issue.1 , pp. 295-305
    • Hu, C.1    Tam, S.C.2    Hsu, F.C.3    Ko, P.K.4    Chan, T.Y.5    Terrill, K.6
  • 150
    • 77957907064 scopus 로고    scopus 로고
    • Mobility enhancement due to charge trapping x00026; defect generation: Physics of self-compensated bti
    • 2010
    • Islam A, Alam M (2010) Mobility enhancement due to charge trapping x00026; defect generation: Physics of self-compensated bti. In: IEEE international reliability physics symposium (IRPS), pp 65-72, 2010. DOI 10.1109/IRPS.2010.5488853
    • (2010) IEEE International Reliability Physics Symposium (IRPS) , pp. 65-72
    • Islam, A.1    Alam, M.2
  • 151
    • 0034246576 scopus 로고    scopus 로고
    • Systematic analysis and modeling of integrated inductors and transformers in rf ic design
    • Koutsoyannopoulos Y, Papananos Y (2000) Systematic analysis and modeling of integrated inductors and transformers in rf ic design. IEEE Trans Circ Syst II: Anal Dig Signal Process 47(8): 699-713. DOI 10.1109/82.861403
    • (2000) IEEE Trans Circ Syst II: Anal Dig Signal Process , vol.47 , Issue.8 , pp. 699-713
    • Koutsoyannopoulos, Y.1    Papananos, Y.2
  • 152
    • 79960836677 scopus 로고    scopus 로고
    • Characterization and modeling of transistor variability in advanced cmos technologies
    • Mezzomo C, Bajolet A, Cathignol A, Di Frenza R, Ghibaudo G (2011) Characterization and modeling of transistor variability in advanced cmos technologies. IEEE Trans Electron Dev 58(8): 2235-2248. DOI 10.1109/TED.2011.2141140
    • (2011) IEEE Trans Electron Dev , vol.58 , Issue.8 , pp. 2235-2248
    • Mezzomo, C.1    Bajolet, A.2    Cathignol, A.3    Di Frenza, R.4    Ghibaudo, G.5
  • 155
    • 79959785385 scopus 로고    scopus 로고
    • Matching model for planar bulk transistors with halo implantation
    • Schaper U, Einfeld J (2011) Matching model for planar bulk transistors with halo implantation. IEEE Electron Dev Lett 32(7): 859-861. DOI 10.1109/LED.2011.2150194
    • (2011) IEEE Electron Dev Lett , vol.32 , Issue.7 , pp. 859-861
    • Schaper, U.1    Einfeld, J.2
  • 156
    • 0024612082 scopus 로고
    • Degradation and breakdown of gate oxides in vlsi devices
    • Sune J, Placencia I, Barniol N, Farres E, Aymerich X (1989) Degradation and breakdown of gate oxides in vlsi devices. Physica Status Solidi (a) 111(2): 675-685. DOI 10.1002/pssa.2211110235, URL http://dx.doi.org/10.1002/pssa.2211110235
    • (1989) Physica Status Solidi (a) , vol.111 , Issue.2 , pp. 675-685
    • Sune, J.1    Placencia, I.2    Barniol, N.3    Farres, E.4    Aymerich, X.5
  • 158
    • 84886448106 scopus 로고    scopus 로고
    • Effects of gate depletion and boron penetration on matching of deep submicron cmos transistors
    • 1997. IEDM'97. Technical digest 1997
    • Tuinhout H, Montree A, Schmitz J, Stolk P (1997) Effects of gate depletion and boron penetration on matching of deep submicron cmos transistors. In: International electron devices meeting, 1997. IEDM'97. Technical digest, pp 631-634, 1997. DOI 10.1109/IEDM.1997.650463
    • (1997) International Electron Devices Meeting , pp. 631-634
    • Tuinhout, H.1    Montree, A.2    Schmitz, J.3    Stolk, P.4
  • 159
    • 77956989919 scopus 로고    scopus 로고
    • On-state hot carrier degradation in drain-extended nmos transistors
    • Varghese D, Moens P, Alam M (2010) on-state hot carrier degradation in drain-extended nmos transistors. IEEE Trans Electron Dev 57(10): 2704-2710. DOI 10.1109/TED.2010.2059632
    • (2010) IEEE Trans Electron Dev , vol.57 , Issue.10 , pp. 2704-2710
    • Varghese, D.1    Moens, P.2    Alam, M.3
  • 160
    • 77954877719 scopus 로고    scopus 로고
    • Department of electrical engineering and computer sciences, University of California, Berkeley
    • BSIM4.6.4 MOSFET Model - Users Manual (2009) Department of electrical engineering and computer sciences, University of California, Berkeley, URL http://www-device.eecs.berkeley.edu/~bsim/
    • (2009) BSIM4.6.4 MOSFET Model - Users Manual
  • 166
    • 0032272385 scopus 로고    scopus 로고
    • Transistor matching in analog cmos applications
    • 1998. IEDM '98 technical digest 1998
    • Pelgrom M, Tuinhout H, Vertregt M (1998) Transistor matching in analog cmos applications. In: International electron devices meeting, 1998. IEDM '98 technical digest, pp 915-918, 1998. DOI 10.1109/IEDM.1998.746503
    • (1998) International Electron Devices Meeting , pp. 915-918
    • Pelgrom, M.1    Tuinhout, H.2    Vertregt, M.3
  • 167


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.