-
1
-
-
46449131702
-
Bio-inspired electronic-mutation with genetic properties for secured identification
-
2007
-
Adi W, Soudan B (2007) Bio-inspired electronic-mutation with genetic properties for secured identification. 2007 BLISS 2007 ECSIS symposium on bio-inspired, learning, and intelligent systems for security, pp 133-136, 2007. DOI 10.1109/BLISS.2007.31
-
(2007)
2007 BLISS 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security
, pp. 133-136
-
-
Adi, W.1
Soudan, B.2
-
2
-
-
37249034179
-
The impact of random device variation on sram cell stability in sub-90-nm cmos technologies
-
Agarwal K, Nassif S (2008) The impact of random device variation on sram cell stability in sub-90-nm cmos technologies. IEEE Trans Very Large Scale Integr Syst 16(1): 86-97. DOI 10.1109/TVLSI.2007.909792
-
(2008)
IEEE Trans Very Large Scale Integr Syst
, vol.16
, Issue.1
, pp. 86-97
-
-
Agarwal, K.1
Nassif, S.2
-
3
-
-
80051967839
-
A formalization of the security features of physical functions
-
2011
-
Armknecht F, Maes R, Sadeghi A, Standaert FX, Wachsmann C (2011) A formalization of the security features of physical functions. In: 2011 IEEE symposium on security and privacy (SP), pp 397-412, 2011. DOI 10.1109/Sp.2011.10
-
(2011)
2011 IEEE Symposium on Security and Privacy (SP)
, pp. 397-412
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.3
Standaert, F.X.4
Wachsmann, C.5
-
5
-
-
77955759569
-
Attack resistant sense amplifier based pufs (sa-puf) with deterministic and controllable reliability of puf responses
-
2010
-
Bhargava M, Cakir C, Mai K (2010) Attack resistant sense amplifier based pufs (sa-puf) with deterministic and controllable reliability of puf responses. In: 2010 IEEE international symposium on hardware-oriented security and trust (HOST), pp 106-111, 2010. DOI 10.1109/HST.2010.5513106
-
(2010)
2010 IEEE International Symposium on Hardware-oriented Security and Trust (HOST)
, pp. 106-111
-
-
Bhargava, M.1
Cakir, C.2
Mai, K.3
-
9
-
-
52449089460
-
Improved privacy of the tree-based hash protocols using physically unclonable function 5229: 77-91
-
Amalfi, Italy, 10-12 Sep 2008
-
Bringer J, Chabanne H, Icart T (2008) Improved privacy of the tree-based hash protocols using physically unclonable function 5229: 77-91. 6th international conference on security and cryptography for networks, Amalfi, Italy, 10-12 Sep 2008
-
(2008)
6th International Conference on Security and Cryptography for Networks
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
10
-
-
77954703388
-
The puf promise
-
Acquisti A, Smith S, Sadeghi AR (eds) Springer, Berlin
-
Busch H, Sotkov M, Katzenbeisser S, Sion R (2010) The puf promise. In: Acquisti A, Smith S, Sadeghi AR (eds) Trust and trustworthy computing. Lecture notes in computer science, vol 6101. Springer, Berlin, pp 290-297, URL http://dx.doi.org/10.1007/978-3-642-13869-0-21, 10.1007/978-3-642-13869-0-21
-
(2010)
Trust and Trustworthy Computing. Lecture Notes in Computer Science, Vol 6101
, pp. 290-297
-
-
Busch, H.1
Sotkov, M.2
Katzenbeisser, S.3
Sion, R.4
-
12
-
-
79952190065
-
Integrated circuit design for physical unclonable function using differential amplifiers
-
Choi BD, Kim TW, Lee MK, Chung KS, Kim D (2010) Integrated circuit design for physical unclonable function using differential amplifiers. Analog integrated circuits and signal processing, pp 1-8. URL http://dx.doi.org/10.1007/s10470-010-9563-8, 10.1007/s10470-010-9563-8
-
(2010)
Analog Integrated Circuits and Signal Processing
, pp. 1-8
-
-
Choi, B.D.1
Kim, T.W.2
Lee, M.K.3
Chung, K.S.4
Kim, D.5
-
18
-
-
79952850452
-
A highly stable leakage-based silicon physical unclonable functions
-
2011
-
Ganta D, Vivekraja V, Priya K, Nazhandali L (2011) A highly stable leakage-based silicon physical unclonable functions. In: 2011 24th international conference on VLSI design (VLSI Design), pp 135-140, 2011. DOI 10.1109/VLSID.2011.72
-
(2011)
2011 24th International Conference on VLSI Design (VLSI Design)
, pp. 135-140
-
-
Ganta, D.1
Vivekraja, V.2
Priya, K.3
Nazhandali, L.4
-
19
-
-
4344584084
-
-
Master's thesis, Massachusetts Institute of Technology, The Stata Center, 32 Vassar Street, Cambridge, Massachusetts 02139
-
Gassend B (2003) Physical random functions. Master's thesis, Massachusetts Institute of Technology, The Stata Center, 32 Vassar Street, Cambridge, Massachusetts 02139
-
(2003)
Physical Random Functions
-
-
Gassend, B.1
-
21
-
-
38049015807
-
Fpga intrinsic pufs and their use for ip protection
-
Paillier P, Verbauwhede I (eds) Lecture notes in computer science, vol 4727. Springer, Berlin
-
Guajardo J, Kumar S, Schrijen GJ, Tuyls P (2007) Fpga intrinsic pufs and their use for ip protection. In: Paillier P, Verbauwhede I (eds) Cryptographic hardware and embedded systems-CHES 2007. Lecture notes in computer science, vol 4727. Springer, Berlin, pp 63-80, URL http://dx.doi.org/10.1007/978-3-540-74735-2-5
-
(2007)
Cryptographic Hardware and Embedded Systems-CHES 2007
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.J.3
Tuyls, P.4
-
22
-
-
62449274873
-
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
-
Guajardo J, kori B, Tuyls P, Kumar S, Bel T, Blom A, Schrijen GJ (2009) Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions. Inform Syst Front 11: 19-41, URL http://dx.doi.org/10.1007/s10796-008-9142-z, 10.1007/s10796-008-9142-z
-
(2009)
Inform Syst Front
, vol.11
, pp. 19-41
-
-
Guajardo, J.1
Kori, B.2
Tuyls, P.3
Kumar, S.4
Bel, T.5
Blom, A.6
Schrijen, G.J.7
-
23
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
Joye M, Quisquater JJ (eds) Lecture notes in computer science, vol 3156. Springer, Berlin
-
Gura N, Patel A, Wander A, Eberle H, Shantz SC (2004) Comparing elliptic curve cryptography and rsa on 8-bit cpus. In: Joye M, Quisquater JJ (eds) Cryptographic hardware and embedded systems - CHES 2004. Lecture notes in computer science, vol 3156. Springer, Berlin, pp 925-943
-
(2004)
Cryptographic Hardware and Embedded Systems - CHES 2004
, pp. 925-943
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
25
-
-
70350741520
-
A physical unclonable function defined using power distribution system equivalent resistance variations
-
ACM, New York, DAC'09 URL http://doi.acm.org/10.1145/1629911.1630089
-
Helinski R, Acharyya D, Plusquellic J (2009) A physical unclonable function defined using power distribution system equivalent resistance variations. In: Proceedings of the 46th annual design automation conference. ACM, New York, DAC'09, pp 676-681, DOI http://doi.acm.org/10.1145/1629911.1630089, URL http://doi.acm.org/10.1145/1629911.1630089
-
(2009)
Proceedings of the 46th Annual Design Automation Conference
, pp. 676-681
-
-
Helinski, R.1
Acharyya, D.2
Plusquellic, J.3
-
26
-
-
33846922353
-
Chip identification using the characteristic dispersion of transistor
-
Hirase J, Furukawa T (2005) Chip identification using the characteristic dispersion of transistor. In: Proceedings 14th Asian test symposium, pp 188-193, DOI 10.1109/ATS.2005.35
-
(2005)
Proceedings 14th Asian Test Symposium
, pp. 188-193
-
-
Hirase, J.1
Furukawa, T.2
-
27
-
-
50249134033
-
Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
-
Holcomb DE, Burleson WP, Fu K (2007) Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Proceedings of the conference on RFID security, URL http://www.cs.umass.edu/~kevinfu/papers/holcomb-FERNS-RFIDSec07.pdf
-
(2007)
Proceedings of the Conference on RFID Security
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
28
-
-
68949175522
-
Power-up SRAM state as an identifying fingerprint and source of true random numbers
-
Holcomb DE, Burleson WP, Fu K (2009) Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans Comput 58(9): 1198-1210, URL http://www.cs.umass.edu/~kevinfu/papers/holcomb-FERNS-IEEE-Computers.pdf
-
(2009)
IEEE Trans Comput
, vol.58
, Issue.9
, pp. 1198-1210
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
31
-
-
0002326595
-
Biometric identification
-
Jain HLPS A (2000) Biometric identification. Commun ACM 43(2): 91-98, DOI 10.1145/328236.328110, URL http://helios.et.put.poznan.pl/~dgajew/download/PUT/SEMESTR-10/IO/FACE-RECOGNITION/BiometricsACM.pdf
-
(2000)
Commun ACM
, vol.43
, Issue.2
, pp. 91-98
-
-
-
33
-
-
79952028413
-
A sub-threshold sram based puf
-
2010
-
Kassem M, Mansour M, Chehab A, Kayssi A (2010) A sub-threshold sram based puf. In: 2010 international conference on energy aware computing (ICEAC), pp 1-4, 2010, DOI 10.1109/ICEAC.2010.5702285
-
(2010)
2010 International Conference on Energy Aware Computing (ICEAC)
, pp. 1-4
-
-
Kassem, M.1
Mansour, M.2
Chehab, A.3
Kayssi, A.4
-
34
-
-
41649105077
-
3d antenna for uhf rfid tags with eliminated read-orientation sensitivity
-
2006
-
Kholodnyak D, Turalchuk P, Mikhailov A, Dudnikov S, Vendik I (2006) 3d antenna for uhf rfid tags with eliminated read-orientation sensitivity. In: 36th European microwave conference, pp 583-586, 2006. DOI 10.1109/EUMC.2006.281459
-
(2006)
36th European Microwave Conference
, pp. 583-586
-
-
Kholodnyak, D.1
Turalchuk, P.2
Mikhailov, A.3
Dudnikov, S.4
Vendik, I.5
-
36
-
-
80052597050
-
Design of unique and reliable physically unclonable functions based on current starved inverter chain
-
2011
-
Kumar R, Patil VC, Kundu S (2011) Design of unique and reliable physically unclonable functions based on current starved inverter chain. In: IEEE computer society annual symposium on VLSI (ISVLSI), pp 224-229, 2011. DOI 10.1109/ISVLSI.2011.82
-
(2011)
IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
, pp. 224-229
-
-
Kumar, R.1
Patil, V.C.2
Kundu, S.3
-
37
-
-
51849144293
-
Extended abstract: The butterfly puf protecting ip on every fpga
-
Kumar S, Guajardo J, Maes R, Schrijen GJ, Tuyls P (2008) Extended abstract: The butterfly puf protecting ip on every fpga. In: IEEE international workshop on hardware-oriented security and trust, HOST 2008, pp 67-70. DOI 10.1109/HST.2008.4559053
-
(2008)
IEEE International Workshop on Hardware-oriented Security and Trust, HOST 2008
, pp. 67-70
-
-
Kumar, S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.J.4
Tuyls, P.5
-
39
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
Digest of technical papers
-
Lee J, Lim D, Gassend B, Suh G, van Dijk M, Devadas S (2004) A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium on VLSI circuits, 2004. Digest of technical papers, pp 176-179. DOI 10.1109/VL-SIC.2004.1346548
-
(2004)
Symposium on VLSI Circuits, 2004
, pp. 176-179
-
-
Lee, J.1
Lim, D.2
Gassend, B.3
Suh, G.4
Van Dijk, M.5
Devadas, S.6
-
40
-
-
78650185683
-
Hardware intrinsic security from d flip-flops
-
ACM, New York, STC'10 URL http://doi.acm.org/10.1145/1867635.1867644
-
van der Leest V, Schrijen GJ, Handschuh H, Tuyls P (2010) Hardware intrinsic security from d flip-flops. In: Proceedings of the fifth ACM workshop on Scalable trusted computing. ACM, New York, STC'10, pp 53-62. DOI http://doi.acm.org/10.1145/1867635.1867644, URL http://doi.acm.org/10.1145/1867635.1867644
-
(2010)
Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing
, pp. 53-62
-
-
Van Der Leest, V.1
Schrijen, G.J.2
Handschuh, H.3
Tuyls, P.4
-
41
-
-
77957943386
-
Low-power sub-threshold design of secure physical unclonable functions
-
2010
-
Lin L, Holcomb D, Krishnappa DK, Shabadi P, Burleson W (2010) Low-power sub-threshold design of secure physical unclonable functions. In: ACM/IEEE international symposium on low-power electronics and design (ISLPED), pp 43-48, 2010
-
(2010)
ACM/IEEE International Symposium on Low-power Electronics and Design (ISLPED)
, pp. 43-48
-
-
Lin, L.1
Holcomb, D.2
Krishnappa, D.K.3
Shabadi, P.4
Burleson, W.5
-
43
-
-
84930025507
-
-
(visited September 23, 2012), not formally published, but a white paper available about SiidTech ICID
-
Lofstrom K (2007) Icid - a robust, low cost integrated circuit identification method, ver. 0.9. URL http://www.kl-ic.com/papers.html (visited September 23, 2012), not formally published, but a white paper available about SiidTech ICID
-
(2007)
Icid - A Robust, Low Cost Integrated Circuit Identification Method, Ver. 0.9
-
-
Lofstrom, K.1
-
48
-
-
85016215043
-
Physically unclonable functions: A study on the state of the art and future research directions
-
Basin D, Maurer U, Sadeghi AR, Naccache D (eds) Springer, Berlin
-
Maes R, Verbauwhede I (2010) Physically unclonable functions: A study on the state of the art and future research directions. In: Basin D, Maurer U, Sadeghi AR, Naccache D (eds) Towards hardware-intrinsic security, information security and cryptography. Springer, Berlin, pp 3-37, URL http://dx.doi.org/10.1007/978-3-642-14452-3-1
-
(2010)
Towards Hardware-intrinsic Security, Information Security and Cryptography
, pp. 3-37
-
-
Maes, R.1
Verbauwhede, I.2
-
49
-
-
77949345944
-
Intrinsic pufs from flip-flops on reconfigurable devices
-
Eindhoven, NL
-
Maes R, Tuyls P, Verbauwhede I (2008) Intrinsic pufs from flip-flops on reconfigurable devices. In: 3rd benelux workshop on information and system security (WISSec 2008), Eindhoven, NL, p 17
-
(2008)
3rd Benelux Workshop on Information and System Security (WISSec 2008)
, pp. 17
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
50
-
-
70449794558
-
Improving the quality of a physical unclonable function using configurable ring oscillators
-
2009. FPL 2009
-
Maiti A, Schaumont P (2009) Improving the quality of a physical unclonable function using configurable ring oscillators. In: International conference on field programmable logic and applications, 2009. FPL 2009, pp 703-707. DOI 10.1109/FPL.2009.5272361
-
(2009)
International Conference on Field Programmable Logic and Applications
, pp. 703-707
-
-
Maiti, A.1
Schaumont, P.2
-
51
-
-
80053529160
-
Improved ring oscillator puf: An fpga-friendly secure primitive
-
Maiti A, Schaumont P (2010) Improved ring oscillator puf: An fpga-friendly secure primitive. J Cryptol 1-23
-
(2010)
J Cryptol
, pp. 1-23
-
-
Maiti, A.1
Schaumont, P.2
-
52
-
-
77955766025
-
A large scale characterization of ro-puf
-
2010
-
Maiti A, Casarona J, McHale L, Schaumont P (2010) A large scale characterization of ro-puf. In: IEEE international symposium on hardware-oriented security and trust (HOST), pp 94-99, 2010
-
(2010)
IEEE International Symposium on Hardware-oriented Security and Trust (HOST)
, pp. 94-99
-
-
Maiti, A.1
Casarona, J.2
McHale, L.3
Schaumont, P.4
-
53
-
-
80053548561
-
Fpga-based true random number generation using circuit metastability with adaptive feedback control
-
Majzoobi M, Koushanfar F, Devadas S (2011) Fpga-based true random number generation using circuit metastability with adaptive feedback control. In: CHES, pp 17-32
-
(2011)
CHES
, pp. 17-32
-
-
Majzoobi, M.1
Koushanfar, F.2
Devadas, S.3
-
56
-
-
0003508568
-
-
(visited Sep 23, 2012)
-
Mehuron W (1999) Data encryption standard (des). URL http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf (visited Sep 23, 2012)
-
(1999)
Data Encryption Standard (des)
-
-
Mehuron, W.1
-
57
-
-
70350679379
-
-
(visited Sep 23, 2012)
-
NSA (2009) The case for elliptic curve cryptography. URL http://www.nsa.gov/business/programs/elliptic-curve.shtml (visited Sep 23, 2012)
-
(2009)
The Case for Elliptic Curve Cryptography
-
-
-
60
-
-
0037144430
-
Physical one-way functions
-
Pappu R, Recht R, Taylor J, Gershenfeld N (2002) Physical one-way functions. Science 297(5589): 2026-2030
-
(2002)
Science
, vol.297
, Issue.5589
, pp. 2026-2030
-
-
Pappu, R.1
Recht, R.2
Taylor, J.3
Gershenfeld, N.4
-
61
-
-
0009553549
-
Protecting devices by active coating
-
Posch R (1998) Protecting devices by active coating. J Universal Comput Sci 4(7): 652-668
-
(1998)
J Universal Comput Sci
, vol.4
, Issue.7
, pp. 652-668
-
-
Posch, R.1
-
63
-
-
28844435788
-
Security and privacy solutions for low-cost rfid systems
-
2004
-
Ranasinghe D, Engels D, Cole P (2004) Security and privacy solutions for low-cost rfid systems. In: Proceedings of the intelligent sensors, sensor networks and information processing conference, 2004, pp 337-342. DOI 10.1109/ISSNIp.2004.1417485
-
(2004)
Proceedings of the Intelligent Sensors, Sensor Networks and Information Processing Conference
, pp. 337-342
-
-
Ranasinghe, D.1
Engels, D.2
Cole, P.3
-
64
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
URL http://doi.acm.org/10.1145/359340.359342
-
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21: 120-126, DOI http://doi.acm.org/10.1145/359340.359342, URL http://doi.acm.org/10.1145/359340.359342
-
(1978)
Commun ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
66
-
-
59849094470
-
Comb capacitor structures for on-chip physical uncloneable function
-
Roy D, Klootwijk J, Verhaegh N, Roosen H, Wolters R (2009) Comb capacitor structures for on-chip physical uncloneable function. IEEE Trans Semicond Manuf 22(1): 96-102. DOI 10.1109/TSM.2008.2010738
-
(2009)
IEEE Trans Semicond Manuf
, vol.22
, Issue.1
, pp. 96-102
-
-
Roy, D.1
Klootwijk, J.2
Verhaegh, N.3
Roosen, H.4
Wolters, R.5
-
67
-
-
79960888516
-
Evaluation of 90nm 6t-sram as physical unclonable function for secure key generation in wireless sensor nodes
-
2011
-
Selimis G, Konijnenburg M, Ashouei M, Huisken J, de Groot H, van der Leest V, Schrijen GJ, van Hulst M, Tuyls P (2011) Evaluation of 90nm 6t-sram as physical unclonable function for secure key generation in wireless sensor nodes. In: IEEE international symposium on circuits and systems (ISCAS), pp 567-570, 2011. DOI 10.1109/ISCAS.2011.5937628
-
(2011)
IEEE International Symposium on Circuits and Systems (ISCAS)
, pp. 567-570
-
-
Selimis, G.1
Konijnenburg, M.2
Ashouei, M.3
Huisken, J.4
De Groot, H.5
Van Der Leest, V.6
Schrijen, G.J.7
Van Hulst, M.8
Tuyls, P.9
-
69
-
-
33746785063
-
Information-theoretic analysis of capacitive physical unclonable functions
-
Skoric B, Maubach S, Kevenaar T, Tuyls P (2006) Information-theoretic analysis of capacitive physical unclonable functions. J Appl Phys 100(2). DOI 10.1063/1.2209532
-
(2006)
J Appl Phys
, vol.100
, Issue.2
-
-
Skoric, B.1
Maubach, S.2
Kevenaar, T.3
Tuyls, P.4
-
72
-
-
79957637413
-
Cmos silicon physical unclonable functions based on intrinsic process variability
-
Stanzione S, Puntin D, Iannaccone G (2011) Cmos silicon physical unclonable functions based on intrinsic process variability. IEEE J Solid State Circ PP(99): 1. DOI 10.1109/JSSC.2011.2120650
-
(2011)
IEEE J Solid State Circ
, vol.PP
, Issue.99
, pp. 1
-
-
Stanzione, S.1
Puntin, D.2
Iannaccone, G.3
-
73
-
-
85008008223
-
A digital 1.6 pj/bit chip identification circuit using process variations
-
Su Y, Holleman J, Otis B (2008) A digital 1.6 pj/bit chip identification circuit using process variations. IEEE J Solid State Circ 43(1): 69-77. DOI 10.1109/JSSC.2007.910961
-
(2008)
IEEE J Solid State Circ
, vol.43
, Issue.1
, pp. 69-77
-
-
Su, Y.1
Holleman, J.2
Otis, B.3
-
75
-
-
78049343605
-
The glitch puf: A new delay-puf architecture exploiting glitch shapes
-
Mangard S, Standaert FX (eds) Lecture notes in computer science, vol 6225. Springer, Berlin
-
Suzuki D, Shimizu K (2010) The glitch puf: A new delay-puf architecture exploiting glitch shapes. In: Mangard S, Standaert FX (eds) Cryptographic hardware and embedded systems, CHES 2010. Lecture notes in computer science, vol 6225. Springer, Berlin, pp 366-382, URL http://dx.doi.org/10.1007/978-3-642-15031-9-25, 10.1007/978-3-642-15031-9-25
-
(2010)
Cryptographic Hardware and Embedded Systems, CHES 2010
, pp. 366-382
-
-
Suzuki, D.1
Shimizu, K.2
-
79
-
-
34547674038
-
-
Springer, Berlin; chap Secret Key Generation from Classical Physics Philips Research Book Series
-
Tuyls P, Škorić B (2005) AmIware: hardware technology drivers of ambient intelligence. Springer, Berlin; chap Secret Key Generation from Classical Physics, pp 421-447. Philips Research Book Series
-
(2005)
AmIware: Hardware Technology Drivers of Ambient Intelligence
, pp. 421-447
-
-
Tuyls, P.1
Škorić, B.2
-
80
-
-
26444487655
-
Information-theoretic security analysis of physical uncloneable functions 3570: 141-155
-
Roseau, Dominica, Feb 28-Mar 03, 2005
-
Tuyls P, Skoric B, Stallinga S, Akkermans A, Ophey W (2005) Information-theoretic security analysis of physical uncloneable functions 3570: 141-155. In: 9th international conference on financial cryptography, Roseau, Dominica, Feb 28-Mar 03, 2005
-
(2005)
9th International Conference on Financial Cryptography
-
-
Tuyls, P.1
Skoric, B.2
Stallinga, S.3
Akkermans, A.4
Ophey, W.5
-
83
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
PerCom 2005
-
Wander A, Gura N, Eberle H, Gupta V, Shantz S (2005) Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE international conference on pervasive computing and communications, 2005. PerCom 2005, pp 324-328. DOI 10.1109/PER-COM.2005.18
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications, 2005
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
88
-
-
85032410463
-
-
Yu H, Leong PHW, Zipf P, Hinkelmann H, Moller L, Glesner M (2009) Towards a unique fpga-based identification circuit using process variations
-
(2009)
Towards a Unique Fpga-based Identification Circuit Using Process Variations
-
-
Yu, H.1
Leong, P.H.W.2
Zipf, P.3
Hinkelmann, H.4
Moller, L.5
Glesner, M.6
-
91
-
-
10244234065
-
Rfid technologies: Supply-chain applications and implementation issues
-
http://www.tandfonline.com/doi/pdf/10.1201/1078/44912.22.1.20051201/85739.7
-
Angeles R (2005) Rfid technologies: Supply-chain applications and implementation issues. Inform Syst Manag 22(1): 51-65, DOI 10.1201/1078/44912.22.1.20051201/85739.7, URL http://www.tandfonline.com/doi/abs/10.1201/1078/44912.22.1.20051201/85739.7, http://www.tandfonline.com/doi/pdf/10.1201/1078/44912.22.1.20051201/85739.7
-
(2005)
Inform Syst Manag
, vol.22
, Issue.1
, pp. 51-65
-
-
Angeles, R.1
-
92
-
-
34547688845
-
Public-key cryptography for rfid-tags
-
Batina L, Guajardo J, Kerins T, Mentens N, Tuyls P, Verbauwhede I (2007) Public-key cryptography for rfid-tags. In: Fifth annual IEEE international conference on pervasive computing and communications workshops. PerCom Workshops'07, pp 217-222. DOI 10.1109/PER-COMW.2007.98
-
(2007)
Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops. PerCom Workshops'07
, pp. 217-222
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
93
-
-
84930035012
-
-
(visited Sep 23, 2012)
-
Bulgreen K (2010) Sildenafil tablets, URL http://www.pfizer.com/files/products/uspi-viagra.pdf (visited Sep 23, 2012)
-
(2010)
Sildenafil Tablets
-
-
Bulgreen, K.1
-
94
-
-
49049105769
-
Design and implementation of puf-based "unclonable" rfid ics for anti-counterfeiting and security applications
-
2008
-
Devadas S, Suh E, Paral S, Sowell R, Ziola T, Khandelwal V (2008) Design and implementation of puf-based "unclonable" rfid ics for anti-counterfeiting and security applications. In: IEEE international conference on RFID, pp 58-64, 2008. DOI 10.1109/RFID.2008.4519377
-
(2008)
IEEE International Conference on RFID
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
96
-
-
84930031912
-
Digital video broadcasting (dvb); extensions to the common interface specification
-
(1999-11)
-
European Telecommunications Standards Institute (1999) Digital video broadcasting (dvb); extensions to the common interface specification. ETSI TS 101 699 V1.1.1 (1999-11)
-
(1999)
ETSI TS 101 699 V1.1.1
-
-
European Telecommunications Standards Institute1
-
98
-
-
38049015807
-
Fpga intrinsic pufs and their use for ip protection
-
Paillier P, Verbauwhede I (eds) Lecture notes in computer science, vol 4727. Springer, Berlin
-
Guajardo J, Kumar S, Schrijen GJ, Tuyls P (2007) Fpga intrinsic pufs and their use for ip protection. In: Paillier P, Verbauwhede I (eds) Cryptographic hardware and embedded systems - CHES 2007. Lecture notes in computer science, vol 4727. Springer, Berlin, pp 63-80, URL http://dx.doi.org/10.1007/978-3-540-74735-2-5
-
(2007)
Cryptographic Hardware and Embedded Systems - CHES 2007
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.J.3
Tuyls, P.4
-
99
-
-
48149093328
-
Physical unclonable functions and public-key crypto for fpga ip protection
-
2007
-
Guajardo J, Kumar S, Schrijen GJ, Tuyls P (2007) Physical unclonable functions and public-key crypto for fpga ip protection. In: International conference on field programmable logic and applications. FPL 2007, pp 189-195, 2007. DOI 10.1109/FPL.2007.4380646
-
(2007)
International Conference on Field Programmable Logic and Applications. FPL 2007
, pp. 189-195
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.J.3
Tuyls, P.4
-
100
-
-
51749089495
-
Brand and ip protection with physical unclonable functions
-
Guajardo J, Kumar S, Schrijen GJ, Tuyls P (2008) Brand and ip protection with physical unclonable functions. In: 2008 IEEE international symposium on circuits and systems, ISCAS 2008, pp 3186-3189. DOI 10.1109/ISCAS.2008.4542135
-
(2008)
2008 IEEE International Symposium on Circuits and Systems, ISCAS 2008
, pp. 3186-3189
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.J.3
Tuyls, P.4
-
101
-
-
62449274873
-
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
-
Guajardo J (2009) Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions. Inform Syst Front 11: 19-41
-
(2009)
Inform Syst Front
, vol.11
, pp. 19-41
-
-
Guajardo, J.1
-
102
-
-
84930037341
-
-
(visited Sep 23, 2012)
-
HavocscopeLLC (2011) Counterfeit goods ranking. URL http://www.havocscope.com/black-market/counterfeit-goods/counterfeit-goods-ranking/ (visited Sep 23, 2012)
-
(2011)
Counterfeit Goods Ranking
-
-
-
104
-
-
51849144293
-
Extended abstract: The butterfly puf protecting ip on every fpga
-
2008
-
Kumar S, Guajardo J, Maes R, Schrijen GJ, Tuyls P (2008) Extended abstract: The butterfly puf protecting ip on every fpga. In: IEEE international workshop on hardware-oriented security and trust, HOST 2008, pp 67-70, 2008. DOI 10.1109/HST.2008.4559053
-
(2008)
IEEE International Workshop on Hardware-oriented Security and Trust, HOST 2008
, pp. 67-70
-
-
Kumar, S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.J.4
Tuyls, P.5
-
105
-
-
84889975404
-
From identification to authentication - A review of rfid product authentication techniques
-
Ranasinghe DC, Cole PH (eds) Springer, Berlin
-
Lehtonen M, Staake T, Michahelles F (2008) From identification to authentication - a review of rfid product authentication techniques. In: Ranasinghe DC, Cole PH (eds) Networked RFID systems and lightweight cryptography. Springer, Berlin, pp 169-187
-
(2008)
Networked RFID Systems and Lightweight Cryptography
, pp. 169-187
-
-
Lehtonen, M.1
Staake, T.2
Michahelles, F.3
-
106
-
-
80755168368
-
On the vulnerability of fpga bitstream encryption against power analysis attacks
-
Moradi A, Barenghi A, Kasper T, Paar C (2011) On the vulnerability of fpga bitstream encryption against power analysis attacks. Memory Rep 201: 111-123, URL http://eprint.iacr.org/2011/390
-
(2011)
Memory Rep
, vol.201
, pp. 111-123
-
-
Moradi, A.1
Barenghi, A.2
Kasper, T.3
Paar, C.4
-
107
-
-
85032397604
-
On the portability of side-channel attacks
-
Moradi A, Kasper M, Paar C (2011) On the portability of side-channel attacks. Design Rep 201: 5-7, URL http://eprint.iacr.org/2011/391
-
(2011)
Design Rep
, vol.201
, pp. 5-7
-
-
Moradi, A.1
Kasper, M.2
Paar, C.3
-
111
-
-
84930036708
-
-
IZ-N SD, Strasse 10, Objekt 48, A-2355 Wiener Neudorf
-
Securikett (2011) Securikett online image katalog. http://www.securikett.com, IZ-N SD, Strasse 10, Objekt 48, A-2355 Wiener Neudorf
-
(2011)
Securikett Online Image Katalog
-
-
-
112
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon C (1949) Communication theory of secrecy systems, Bell Syst Tech J 28: 655-715
-
(1949)
Bell Syst Tech J
, vol.28
, pp. 655-715
-
-
Shannon, C.1
-
113
-
-
33750702480
-
Offline hardware/software authentication for reconfigurable platforms
-
Goubin L, Matsui M (eds) Proceedings of the 8th international workshop. (Lecture notes in computer science, Vol. 4249). Springer, Berlin Cryptographic Hardware and Embedded Systems-CHES 2006. 8th International Workshop. Proceedings, 10-13 October 2006, Yokohama, Japan
-
Simpson E, Schaumont P (2006) Offline hardware/software authentication for reconfigurable platforms. In: Goubin L, Matsui M (eds) Cryptographic hardware and embedded systems-CHES 2006. Proceedings of the 8th international workshop. (Lecture notes in computer science, Vol. 4249). Springer, Berlin, pp 311-323, Cryptographic Hardware and Embedded Systems-CHES 2006. 8th International Workshop. Proceedings, 10-13 October 2006, Yokohama, Japan
-
(2006)
Cryptographic Hardware and Embedded Systems-CHES 2006
, pp. 311-323
-
-
Simpson, E.1
Schaumont, P.2
-
114
-
-
32844471136
-
An introduction to rfid technology
-
Want R (2006) An introduction to rfid technology. IEEE Pervasive Comput 5(1): 25-33. DOI 10.1109/MPRV.2006.2
-
(2006)
IEEE Pervasive Comput
, vol.5
, Issue.1
, pp. 25-33
-
-
Want, R.1
-
115
-
-
77952339214
-
Application of mismatched cellular nonlinear networks for physical cryptography
-
2010
-
Csaba G, Ju X, Ma Z, Chen Q, Porod W, Schmidhuber J, Schlichtmann U, Lugli P, Ruhrmair U (2010) Application of mismatched cellular nonlinear networks for physical cryptography. In: 12th international workshop on cellular nanoscale networks and their applications (CNNA), pp 1-6, 2010. DOI 10.1109/CNNA.2010.5430303
-
(2010)
12th International Workshop on Cellular Nanoscale Networks and their Applications (CNNA)
, pp. 1-6
-
-
Csaba, G.1
Ju, X.2
Ma, Z.3
Chen, Q.4
Porod, W.5
Schmidhuber, J.6
Schlichtmann, U.7
Lugli, P.8
Ruhrmair, U.9
-
116
-
-
4344587804
-
Identification and authentication of integrated circuits
-
Gassend B, Lim D, Clarke D, Dijk MV, Devadas S (2004) Identification and authentication of integrated circuits. Concurr Comput Pract Exper 16: 1077-1098. DOI 10.1002/cpe.805, URL http://www.cse.msstate.edu/~ramkumar/fulltext.pdf
-
(2004)
Concurr Comput Pract Exper
, vol.16
, pp. 1077-1098
-
-
Gassend, B.1
Lim, D.2
Clarke, D.3
Dijk, M.V.4
Devadas, S.5
-
117
-
-
85046784642
-
Unclonable lightweight authentication scheme 5308: 33-48
-
Birmingham, England, 20-22 Oct 2008
-
Hammouri G, Oeztuerk E, Birand B, Sunar B (2008) Unclonable lightweight authentication scheme 5308: 33-48. In: 10th international conference on information and communications security, Birmingham, England, 20-22 Oct 2008
-
(2008)
10th International Conference on Information and Communications Security
-
-
Hammouri, G.1
Oeztuerk, E.2
Birand, B.3
Sunar, B.4
-
118
-
-
85032410864
-
Identifikation, authentifizierung und schluesselgenerierung mittels physical unclonable functions
-
Hofer M, Boehm C (2010) Identifikation, authentifizierung und schluesselgenerierung mittels physical unclonable functions. In: Informationstagung Mikroelektronik ME2010, pp 267-272
-
(2010)
Informationstagung Mikroelektronik ME2010
, pp. 267-272
-
-
Hofer, M.1
Boehm, C.2
-
123
-
-
33644640188
-
Stable sram cell design for the 32 nm node and beyond
-
2005. Digest of Technical Papers 2005
-
Chang L, Fried D, Hergenrother J, Sleight J, Dennard R, Montoye R, Sekaric L, McNab S, Topol A, Adams C, Guarini K, Haensch W (2005) Stable sram cell design for the 32 nm node and beyond. In: Symposium on VLSI Technology, 2005. Digest of Technical Papers, pp 128-129, 2005. DOI 10.1109/.2005.1469239
-
(2005)
Symposium on VLSI Technology
, pp. 128-129
-
-
Chang, L.1
Fried, D.2
Hergenrother, J.3
Sleight, J.4
Dennard, R.5
Montoye, R.6
Sekaric, L.7
McNab, S.8
Topol, A.9
Adams, C.10
Guarini, K.11
Haensch, W.12
-
124
-
-
77956203762
-
Quality metric evaluation of a physical unclonable function derived from an ic's power distribution system
-
2010
-
Helinski R, Acharyya D, Plusquellic J (2010) Quality metric evaluation of a physical unclonable function derived from an ic's power distribution system. In: 47th ACM/IEEE design automation conference (DAC), pp 240-243, 2010
-
(2010)
47th ACM/IEEE Design Automation Conference (DAC)
, pp. 240-243
-
-
Helinski, R.1
Acharyya, D.2
Plusquellic, J.3
-
125
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Lim D, Lee J, Gassend B, Suh G, van Dijk M, Devadas S (2005) Extracting secret keys from integrated circuits. IEEE Trans Very Large Scale Integr (VLSI) Syst 13(10): 1200-1205. DOI 10.1109/TVLSI.2005.859470
-
(2005)
IEEE Trans Very Large Scale Integr (VLSI) Syst
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.2
Gassend, B.3
Suh, G.4
Van Dijk, M.5
Devadas, S.6
-
126
-
-
85016215043
-
Physically unclonable functions: A study on the state of the art and future research directions
-
Basin D, Maurer U, Sadeghi AR, Naccache D (eds) Springer, Berlin 2010
-
Maes R, Verbauwhede I (2010) Physically unclonable functions: A study on the state of the art and future research directions. In: Basin D, Maurer U, Sadeghi AR, Naccache D (eds) Towards hardware-intrinsic security, information security and cryptography. Springer, Berlin, pp 3-37, 2010, URL http://dx.doi.org/10.1007/978-3-642-14452-3-1
-
(2010)
Towards Hardware-intrinsic Security, Information Security and Cryptography
, pp. 3-37
-
-
Maes, R.1
Verbauwhede, I.2
-
128
-
-
79957637413
-
Cmos silicon physical unclonable functions based on intrinsic process variability
-
Stanzione S, Puntin D, Iannaccone G (2011) Cmos silicon physical unclonable functions based on intrinsic process variability. IEEE J Solid-State Circ PP(99): 1. DOI 10.1109/JSSC.2011.2120650
-
(2011)
IEEE J Solid-State Circ
, vol.PP
, Issue.99
, pp. 1
-
-
Stanzione, S.1
Puntin, D.2
Iannaccone, G.3
-
129
-
-
85008008223
-
A digital 1.6 pj/bit chip identification circuit using process variations
-
Su Y, Holleman J, Otis B (2008) A digital 1.6 pj/bit chip identification circuit using process variations. IEEE J Solid-State Circ 43(1): 69-77. DOI 10.1109/JSSC.2007.910961
-
(2008)
IEEE J Solid-State Circ
, vol.43
, Issue.1
, pp. 69-77
-
-
Su, Y.1
Holleman, J.2
Otis, B.3
-
131
-
-
0036567024
-
Block error-correcting codes for systems with a very high ber: Theoretical analysis and application to the protection of watermarks
-
Desset C, Macq B, Vandendorpe L (2002) Block error-correcting codes for systems with a very high ber: Theoretical analysis and application to the protection of watermarks. Signal Process Image Commun 17: 409-421
-
(2002)
Signal Process Image Commun
, vol.17
, pp. 409-421
-
-
Desset, C.1
Macq, B.2
Vandendorpe, L.3
-
132
-
-
17744381820
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
2007
-
Dodis Y (2007) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Proceedings of Eurocrypt 2007, pp 523-540, 2007
-
(2007)
Proceedings of Eurocrypt 2007
, pp. 523-540
-
-
Dodis, Y.1
-
134
-
-
84943817322
-
Error detecting and error correcting codes
-
Hamming R (1950) Error detecting and error correcting codes. Bell Syst Tech Syst 29: 147-160
-
(1950)
Bell Syst Tech Syst
, vol.29
, pp. 147-160
-
-
Hamming, R.1
-
140
-
-
0002947255
-
A mathematical theory of communication
-
URL http://doi.acm.org/10.1145/584091.584093
-
Shannon CE (1948) A mathematical theory of communication. SIGMOBILE Mob Comput Commun Rev 5: 3-55. DOI http://doi.acm.org/10.1145/584091.584093, URL http://doi.acm.org/10.1145/584091.584093
-
(1948)
SIGMOBILE Mob Comput Commun Rev
, vol.5
, pp. 3-55
-
-
Shannon, C.E.1
-
141
-
-
85008008223
-
A digital 1.6 pj/bit chip identification circuit using process variations
-
Su Y, Holleman J, Otis B (2008) A digital 1.6 pj/bit chip identification circuit using process variations. IEEE J Solid State Circ 43(1): 69-77. DOI 10.1109/JSSC.2007.910961
-
(2008)
IEEE J Solid State Circ
, vol.43
, Issue.1
, pp. 69-77
-
-
Su, Y.1
Holleman, J.2
Otis, B.3
-
143
-
-
0042912833
-
Simulation of intrinsic parameter fluctuations in decananometer and nanometer-scale mosfets
-
Asenov A, Brown A, Davies J, Kaya S, Slavcheva G (2003) Simulation of intrinsic parameter fluctuations in decananometer and nanometer-scale mosfets. IEEE Trans Electron Dev 50(9): 1837-1852. DOI 10.1109/TED.2003.815862
-
(2003)
IEEE Trans Electron Dev
, vol.50
, Issue.9
, pp. 1837-1852
-
-
Asenov, A.1
Brown, A.2
Davies, J.3
Kaya, S.4
Slavcheva, G.5
-
144
-
-
33748535403
-
High-performance cmos variability in the 65-nm regime and beyond
-
Bernstein K, Frank DJ, Gattiker AE, Haensch W, Ji BL, Nassif SR, Nowak EJ, Pearson DJ, Rohrer NJ (2006) High-performance cmos variability in the 65-nm regime and beyond. IBM J Res Develop 50(4.5): 433-449. DOI 10.1147/rd.504.0433
-
(2006)
IBM J Res Develop
, vol.50
, Issue.4-5
, pp. 433-449
-
-
Bernstein, K.1
Frank, D.J.2
Gattiker, A.E.3
Haensch, W.4
Ji, B.L.5
Nassif, S.R.6
Nowak, E.J.7
Pearson, D.J.8
Rohrer, N.J.9
-
145
-
-
84937650904
-
Electromigration; a brief survey and some recent results
-
Black J (1969) Electromigration; a brief survey and some recent results. IEEE Trans Electron Dev 16(4): 338-347. DOI 10.1109/T-ED.1969.16754
-
(1969)
IEEE Trans Electron Dev
, vol.16
, Issue.4
, pp. 338-347
-
-
Black, J.1
-
146
-
-
0033307322
-
A comprehensive mosfet mismatch model
-
1999. IEDM Technical Digest 1999
-
Drennan P, McAndrew C (1999) A comprehensive mosfet mismatch model. In: International electron devices meeting, 1999. IEDM Technical Digest, pp 167-170, 1999. DOI 10.1109/IEDM.1999.823871
-
(1999)
International Electron Devices Meeting
, pp. 167-170
-
-
Drennan, P.1
McAndrew, C.2
-
147
-
-
0037346346
-
Understanding mosfet mismatch for analog design
-
Drennan P, McAndrew C (2003) Understanding mosfet mismatch for analog design. IEEE J Solid State Circ 38(3): 450-456. DOI 10.1109/JSSC.2002.808305
-
(2003)
IEEE J Solid State Circ
, vol.38
, Issue.3
, pp. 450-456
-
-
Drennan, P.1
McAndrew, C.2
-
149
-
-
0022009168
-
Hot-electron-induced mosfet degradation - Model, monitor, and improvement
-
Hu C, Tam SC, Hsu FC, Ko PK, Chan TY, Terrill K (1985) Hot-electron-induced mosfet degradation - model, monitor, and improvement. IEEE J Solid State Circ 20(1): 295-305. DOI 10.1109/JSSC.1985.1052306
-
(1985)
IEEE J Solid State Circ
, vol.20
, Issue.1
, pp. 295-305
-
-
Hu, C.1
Tam, S.C.2
Hsu, F.C.3
Ko, P.K.4
Chan, T.Y.5
Terrill, K.6
-
150
-
-
77957907064
-
Mobility enhancement due to charge trapping x00026; defect generation: Physics of self-compensated bti
-
2010
-
Islam A, Alam M (2010) Mobility enhancement due to charge trapping x00026; defect generation: Physics of self-compensated bti. In: IEEE international reliability physics symposium (IRPS), pp 65-72, 2010. DOI 10.1109/IRPS.2010.5488853
-
(2010)
IEEE International Reliability Physics Symposium (IRPS)
, pp. 65-72
-
-
Islam, A.1
Alam, M.2
-
151
-
-
0034246576
-
Systematic analysis and modeling of integrated inductors and transformers in rf ic design
-
Koutsoyannopoulos Y, Papananos Y (2000) Systematic analysis and modeling of integrated inductors and transformers in rf ic design. IEEE Trans Circ Syst II: Anal Dig Signal Process 47(8): 699-713. DOI 10.1109/82.861403
-
(2000)
IEEE Trans Circ Syst II: Anal Dig Signal Process
, vol.47
, Issue.8
, pp. 699-713
-
-
Koutsoyannopoulos, Y.1
Papananos, Y.2
-
152
-
-
79960836677
-
Characterization and modeling of transistor variability in advanced cmos technologies
-
Mezzomo C, Bajolet A, Cathignol A, Di Frenza R, Ghibaudo G (2011) Characterization and modeling of transistor variability in advanced cmos technologies. IEEE Trans Electron Dev 58(8): 2235-2248. DOI 10.1109/TED.2011.2141140
-
(2011)
IEEE Trans Electron Dev
, vol.58
, Issue.8
, pp. 2235-2248
-
-
Mezzomo, C.1
Bajolet, A.2
Cathignol, A.3
Di Frenza, R.4
Ghibaudo, G.5
-
154
-
-
20444441991
-
Review on high-k dielectrics reliability issues
-
Ribes G, Mitard J, Denais M, Bruyere S, Monsieur F, Parthasarathy C, Vincent E, Ghibaudo G (2005) Review on high-k dielectrics reliability issues. IEEE Trans Dev Mater Reliabil 5(1): 5-19. DOI 10.1109/TDMR.2005.845236
-
(2005)
IEEE Trans Dev Mater Reliabil
, vol.5
, Issue.1
, pp. 5-19
-
-
Ribes, G.1
Mitard, J.2
Denais, M.3
Bruyere, S.4
Monsieur, F.5
Parthasarathy, C.6
Vincent, E.7
Ghibaudo, G.8
-
155
-
-
79959785385
-
Matching model for planar bulk transistors with halo implantation
-
Schaper U, Einfeld J (2011) Matching model for planar bulk transistors with halo implantation. IEEE Electron Dev Lett 32(7): 859-861. DOI 10.1109/LED.2011.2150194
-
(2011)
IEEE Electron Dev Lett
, vol.32
, Issue.7
, pp. 859-861
-
-
Schaper, U.1
Einfeld, J.2
-
156
-
-
0024612082
-
Degradation and breakdown of gate oxides in vlsi devices
-
Sune J, Placencia I, Barniol N, Farres E, Aymerich X (1989) Degradation and breakdown of gate oxides in vlsi devices. Physica Status Solidi (a) 111(2): 675-685. DOI 10.1002/pssa.2211110235, URL http://dx.doi.org/10.1002/pssa.2211110235
-
(1989)
Physica Status Solidi (a)
, vol.111
, Issue.2
, pp. 675-685
-
-
Sune, J.1
Placencia, I.2
Barniol, N.3
Farres, E.4
Aymerich, X.5
-
158
-
-
84886448106
-
Effects of gate depletion and boron penetration on matching of deep submicron cmos transistors
-
1997. IEDM'97. Technical digest 1997
-
Tuinhout H, Montree A, Schmitz J, Stolk P (1997) Effects of gate depletion and boron penetration on matching of deep submicron cmos transistors. In: International electron devices meeting, 1997. IEDM'97. Technical digest, pp 631-634, 1997. DOI 10.1109/IEDM.1997.650463
-
(1997)
International Electron Devices Meeting
, pp. 631-634
-
-
Tuinhout, H.1
Montree, A.2
Schmitz, J.3
Stolk, P.4
-
159
-
-
77956989919
-
On-state hot carrier degradation in drain-extended nmos transistors
-
Varghese D, Moens P, Alam M (2010) on-state hot carrier degradation in drain-extended nmos transistors. IEEE Trans Electron Dev 57(10): 2704-2710. DOI 10.1109/TED.2010.2059632
-
(2010)
IEEE Trans Electron Dev
, vol.57
, Issue.10
, pp. 2704-2710
-
-
Varghese, D.1
Moens, P.2
Alam, M.3
-
160
-
-
77954877719
-
-
Department of electrical engineering and computer sciences, University of California, Berkeley
-
BSIM4.6.4 MOSFET Model - Users Manual (2009) Department of electrical engineering and computer sciences, University of California, Berkeley, URL http://www-device.eecs.berkeley.edu/~bsim/
-
(2009)
BSIM4.6.4 MOSFET Model - Users Manual
-
-
-
166
-
-
0032272385
-
Transistor matching in analog cmos applications
-
1998. IEDM '98 technical digest 1998
-
Pelgrom M, Tuinhout H, Vertregt M (1998) Transistor matching in analog cmos applications. In: International electron devices meeting, 1998. IEDM '98 technical digest, pp 915-918, 1998. DOI 10.1109/IEDM.1998.746503
-
(1998)
International Electron Devices Meeting
, pp. 915-918
-
-
Pelgrom, M.1
Tuinhout, H.2
Vertregt, M.3
-
167
-
-
1942433492
-
-
Oxford University Press, New York
-
Tsividis Y (1999) The MOS transistor. Oxford University Press, New York
-
(1999)
The MOS Transistor
-
-
Tsividis, Y.1
|