-
3
-
-
84908165379
-
Active and passive side-channel attacks on delay based PUF designs
-
Georg T. Becker and Raghavan Kumar. 2014. Active and passive side-channel attacks on delay based PUF designs. IACR Cryptology ePrint Archive 2014, 287. http://eprint.iacr.org/2014/287.
-
(2014)
IACR Cryptology EPrint Archive
, pp. 287
-
-
Becker, G.T.1
Kumar, R.2
-
5
-
-
24944501364
-
Secure remote authentication using biometric data
-
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, and Adam Smith. 2005. Secure remote authentication using biometric data. In Advances in Cryptology -EUROCRYPT 2005, 24th International Conference on the Theory and Applications of Cryptographic Techniques. 147-163.
-
(2005)
Advances in Cryptology -EUROCRYPT 2005, 24th International Conference on the Theory and Applications of Cryptographic Techniques
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
6
-
-
77956425492
-
Efficient and practical authentication of PUF-based RFID tags in supply chains
-
Pier Francesco Cortese, Francesco Gemmiti, Bernardo Palazzi, Maurizio Pizzonia, and Massimo Rimondini. 2010. Efficient and practical authentication of PUF-based RFID tags in supply chains. In International Conference on RFID-Technology and Applications (RFID-TA'10). 182-188.
-
(2011)
International Conference on RFID-Technology and Applications (RFID-TA'10
, pp. 182-188
-
-
Francesco Cortese, P.1
Gemmiti, F.2
Palazzi, B.3
Pizzonia, M.4
Rimondini, M.5
-
7
-
-
84862090707
-
PUF-based secure test wrapper design for cryptographic SoC testing
-
Amitabh Das, Ünal Kocabaş, Ahmad-Reza Sadeghi, and Ingrid Verbauwhede. 2012. PUF-based secure test wrapper design for cryptographic SoC testing. In Conference &Exhibition on Design, Automation &Test in Europe (DATE'12). 866-869.
-
(2012)
Conference &Exhibition on Design, Automation &Test in Europe (DATE'12
, pp. 866-869
-
-
Das, A.1
Kocabas, U.2
Sadeghi, A.3
Verbauwhede, I.4
-
8
-
-
84930506995
-
Helper data algorithms for PUF-based key generation: Overview and analysis
-
Jeroen Delvaux, Dawu Gu, Dries Schellekens, and Ingrid Verbauwhede. 2015. Helper data algorithms for PUF-based key generation: Overview and analysis. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34, 6 (2015), 889-902.
-
(2015)
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
, vol.34
, Issue.6
, pp. 889-902
-
-
Delvaux, J.1
Gu, D.2
Schellekens, D.3
Verbauwhede, I.4
-
10
-
-
84945406650
-
Unclonable" RFID ICs for anti-counterfeiting and security applications
-
Design and implementation of PUF-based
-
Srinivas Devadas, G. Edward Suh, Sid Paral, Richard Sowell, Tom Ziola, and Vivek Khandelwal. 2008. Design and implementation of PUF-based "unclonable" RFID ICs for anti-counterfeiting and security applications. In International Conference on RFID. 58-64.
-
(2008)
International Conference on RFID
, pp. 58-64
-
-
Devadas, S.1
Edward Suh, G.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
11
-
-
52149117439
-
-
SIAM J. Comput
-
Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith. 2008. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38, 1 (2008), 97-139.
-
(2008)
2008. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
13
-
-
4344584084
-
-
Master's thesis. Massachusetts Institute of Technology. Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, and Srinivas Devadas. 2002a. Controlled physical random functions ACSAC. IEEE Computer Society
-
Blaise Gassend. 2003. Physical Random Functions. Master's thesis. Massachusetts Institute of Technology. Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, and Srinivas Devadas. 2002a. Controlled physical random functions. In ACSAC. IEEE Computer Society, 149-160.
-
(2003)
Physical random functions
, pp. 149-160
-
-
Gassend, B.1
-
14
-
-
0038341105
-
Silicon physical random functions
-
random functions Vijayalakshmi Atluri (Ed.). ACM
-
Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, and Srinivas Devadas. 2002b. Silicon physical random functions. In ACM Conference on Computer and Communications Security, Vijayalakshmi Atluri (Ed.). ACM, 148-160.
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 148-160
-
-
Gassend, B.1
Dwaine, E.2
Van Dijk, C.M.3
Devadas, S.4
-
15
-
-
85206048915
-
2008. Controlled physical
-
random functions and applications Article 3 Jan
-
Blaise Gassend, Marten van Dijk, Dwaine E. Clarke, Emina Torlak, Srinivas Devadas, and Pim Tuyls. 2008. Controlled physical random functions and applications. ACM Transactions on Information and System Security 10, 4, Article 3 (Jan. 2008).
-
(2008)
ACM Transactions on Information and System Security
, vol.10
, pp. 4
-
-
Gassend, B.1
Van Dijk, M.2
Dwaine, E.3
Emina Torlak, C.4
Devadas, S.5
Tuyls, P.6
-
17
-
-
55349112850
-
A tamper-proof and lightweight authentication scheme
-
Ghaith Hammouri, ErdinçÖztürk, and Berk Sunar. 2008. A tamper-proof and lightweight authentication scheme. Pervasive and Mobile Computing 4, 6 (2008), 807-818.
-
(2008)
Pervasive and Mobile Computing
, vol.4
, Issue.6
, pp. 807-818
-
-
Hammouri, G.1
Oztürk, E.2
Sunar, B.3
-
21
-
-
68949175522
-
2009. Power-Up SRAM state as an identifying fingerprint and source of true
-
random numbers
-
Daniel E. Holcomb, Wayne P. Burleson, and Kevin Fu. 2009. Power-Up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Transactions on Computers 58, 9 (2009), 1198-1210.
-
(2009)
IEEE Transactions on Computers
, vol.58
, Issue.9
, pp. 1198-1210
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
25
-
-
84867554249
-
PUF-enhanced offline RFID security and privacy
-
Nov
-
Sleyman Kardas, Serkan Çelik, Muhammet Yildiz, and Albert Levi. 2012. PUF-enhanced offline RFID security and privacy. Joural of Network and Computer Applications 35, 6 (Nov. 2012), 2059-2067.
-
(2012)
Joural of Network and Computer Applications
, vol.35
, Issue.6
, pp. 2059-2067
-
-
Kardas, S.1
Celik, S.2
Yildiz, M.3
Levi, A.4
-
26
-
-
79955894210
-
Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems
-
Süleyman Kardas, Mete Akgün, Mehmet Sabir Kiraz, and Hüseyin Demirci. 2011. Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems. In 2011 Workshop on Lightweight Security Privacy: Devices, Protocols and Applications (LightSec). 20-25.
-
(2011)
2011 Workshop on Lightweight Security Privacy: Devices, Protocols and Applications (LightSec
, pp. 20-25
-
-
Kardas, S.1
Akgun, M.2
Sabir Kiraz, M.3
Demirci, H.4
-
27
-
-
84881258838
-
Recyclable PUFs: Logically reconfigurable PUFs
-
Stefan Katzenbeisser, Ünal Kocabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, and Christian Wachsmann. 2011a. Recyclable PUFs: Logically reconfigurable PUFs. J. Cryptographic Engineering 1, 3 (2011), 177-186.
-
(2011)
J.Cryptographic Engineering
, vol.1
, Issue.3
, pp. 177-186
-
-
Katzenbeisser, S.1
Kocabas, U.2
Van Der, L.V.3
Sadeghi, A.R.4
Schrijen, G.J.5
Wachsmann, C.6
-
28
-
-
80053484096
-
Recyclable PUFs: Logically reconfigurable PUFs
-
Stefan Katzenbeisser, Ünal Kocabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schroder, and Christian Wachsmann. 2011b. Recyclable PUFs: Logically reconfigurable PUFs. In 13th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'11). 374-389.
-
(2011)
13th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'11
, pp. 374-389
-
-
Katzenbeisser, S.1
Kocabas, U.2
Van Der Leest, V.3
Sadeghi, A.R.4
Schrijen, G.J.5
Schroder, H.6
Wachsmann, C.7
-
33
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
Jae W. Lee, Daihyun Lim, Blaise Gassend, G. Edward Suh, Marten van Dijk, and Srinivas Devadas. 2004. A technique to build a secret key in integrated circuits for identification and authentication applications. In Symposium on VLSI Circuits. 176-179.
-
(2004)
Symposium on VLSI Circuits
, pp. 176-179
-
-
Lee Jae, W.1
Lim, D.2
Gassend, B.3
Edward Suh, G.4
Van Dijk, M.5
Devadas, S.6
-
39
-
-
84864182393
-
Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching
-
Mehrdad Majzoobi, Masoud Rostami, Farinaz Koushanfar, Dan S. Wallach, and Srinivas Devadas. 2012. Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching. In Symposium on Security and Privacy Workshops. 33-44.
-
(2012)
Symposium on Security and Privacy Workshops
, pp. 33-44
-
-
Majzoobi, M.1
Rostami, M.2
Koushanfar, F.3
Wallach, D.S.4
Devadas, S.5
-
43
-
-
49149115221
-
Towards robust low cost authentication for pervasive devices
-
IEEE Computer Society
-
ErdinçÖztürk, Ghaith Hammouri, and Berk Sunar. 2008. Towards robust low cost authentication for pervasive devices. In PerCom. IEEE Computer Society, 170-178.
-
(2008)
PerCom
, pp. 170-178
-
-
Öztürk, E.1
Hammouri, G.2
Sunar, B.3
-
45
-
-
80052007887
-
Reliable and efficient PUF-based key generation using pattern matching
-
IEEE Computer Society
-
Zdenek Sid Paral and Srinivas Devadas. 2011. Reliable and efficient PUF-based key generation using pattern matching. In HOST. IEEE Computer Society, 128-133.
-
(2011)
HOST
, pp. 128-133
-
-
Sid Paral, Z.1
Devadas, S.2
-
46
-
-
33750931897
-
Security and privacy: Modest proposals for low-cost RFID systems
-
Random permutation statistics Marko M. Riedel 2014
-
Damith C. Ranasinghe, Daniel W. Engels, and Peter H. Cole. 2004. Security and privacy: Modest proposals for low-cost RFID systems. In Auto-ID Labs Research Workshop. Marko M. Riedel. 2014. Random permutation statistics. http://en.wikipedia.org/wiki/Random-permutation-statistics.
-
(2004)
Auto-ID Labs Research Workshop
-
-
Ranasinghe, D.C.1
Engels, D.W.2
Cole, P.H.3
-
47
-
-
84904854695
-
Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching
-
Masoud Rostami, Mehrdad Majzoobi, Farinaz Koushanfar, Dan S. Wallach, and Srinivas Devadas. 2014. Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching. IEEE Transactions on Emerging Topics in Computing 2, 1 (2014), 37-49.
-
(2014)
IEEE Transactions on Emerging Topics in Computing
, vol.2
, Issue.1
, pp. 37-49
-
-
Rostami, M.1
Majzoobi, M.2
Koushanfar, F.3
Wallach, D.S.4
Devadas, S.5
-
48
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
Ulrich Rührmair, Frank Sehnke, Jan Solter, Gideon Dror, Srinivas Devadas, and Jürgen Schmidhuber. 2010. Modeling attacks on physical unclonable functions. In 17th Conference on Computer and Communications Security (CCS'10). 237-249.
-
(2011)
17th Conference on Computer and Communications Security (CCS'10
, pp. 237-249
-
-
Rührmair, U.1
Sehnke, F.2
Solter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
49
-
-
84887313066
-
PUFmodeling attacks on simulated and silicon data
-
Ulrich Rührmair, Jan Solter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jürgen Schmidhuber,Wayne Burleson, and Srinivas Devadas. 2013. PUFmodeling attacks on simulated and silicon data. IEEE Transactions on Information Forensics and Security 8, 11 (2013), 1876-1891.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.11
, pp. 1876-1891
-
-
Rührmair, U.1
Solter, J.2
Sehnke, F.3
Xu, X.4
Mahmoud, A.5
Stoyanova, V.6
Dror, G.7
Schmidhuber, J.8
Burleson, W.9
Devadas, S.10
-
50
-
-
84921514717
-
Efficient power and timing side channels for physical unclonable functions
-
Ulrich Rührmair, Xiaolin Xu, Jan Solter, Ahmed Mahmoud, Mehrdad Majzoobi, Farinaz Koushanfar, and Wayne P. Burleson. 2014. Efficient power and timing side channels for physical unclonable functions. In 16th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'14). 476-492.
-
(2014)
16th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'14)
, pp. 476-492
-
-
Rührmair, U.1
Xu, X.2
Solter, J.3
Mahmoud, A.4
Majzoobi, M.5
Koushanfar, F.6
Burleson, W.P.7
-
52
-
-
84920690756
-
Security analysis of a PUF based RFID authentication protocol
-
Masoumeh Safkhani, Nasour Bagheri, and Majid Naderi. 2011. Security analysis of a PUF based RFID authentication protocol. IACR Cryptology ePrint Archive 2011, 704. http://eprint.iacr.org/2011/704.
-
(2011)
IACR Cryptology EPrint Archive
, pp. 704
-
-
Safkhani, M.1
Bagheri, N.2
Naderi, M.3
-
54
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
Gookwon Edward Suh and Srinivas Devadas. 2007. Physical unclonable functions for device authentication and secret key generation. In 44th Design Automation Conference (DAC'07). 9-14.
-
(2007)
44th Design Automation Conference (DAC'07
, pp. 9-14
-
-
Edward Suh, G.1
Devadas, S.2
-
55
-
-
84921327778
-
Physical characterization of arbiter PUFs
-
Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, and Helmar Dittrich. 2014. Physical characterization of arbiter PUFs. In 16th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'14). 493-509.
-
(2014)
16th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'14
, pp. 493-509
-
-
Tajik, S.1
Dietz, E.2
Frohmann, S.3
Seifert, J.4
Nedospasov, D.5
Helfmeier, C.6
Boit, C.7
Dittrich, H.8
-
57
-
-
84865824388
-
Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs
-
Anthony Van Herrewege, Stefan Katzenbeisser, Roel Maes, Roel Peeters, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, and ChristianWachsmann. 2012. Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs. In 16th International Conference on Financial Cryptography and Data Security (FC'12). 374-389.
-
(2012)
16th International Conference on Financial Cryptography and Data Security (FC'12
, pp. 374-389
-
-
Van Herrewege, A.1
Katzenbeisser, S.2
Maes, R.3
Peeters, R.4
Sadeghi, A.5
Verbauwhede, I.6
Wachsmann, C.7
|