메뉴 건너뛰기




Volumn 280 LNEE, Issue , 2014, Pages 277-284

Performance analysis for PUF data using fuzzy extractor

Author keywords

Arbiter PUF; Fuzzy Extractor; Physical Unclonable Function (PUF)

Indexed keywords

ACCESS CONTROL; ERROR CORRECTION; INFORMATION TECHNOLOGY;

EID: 84958527394     PISSN: 18761100     EISSN: 18761119     Source Type: Book Series    
DOI: 10.1007/978-3-642-41671-2_36     Document Type: Conference Paper
Times cited : (14)

References (7)
  • 1
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data (A preliminary version of this paper appeared in eurocrypt 2004)
    • Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data (A preliminary version of this paper appeared in Eurocrypt 2004). SIAM J. Comput. 38(1), 97-139 (2008)
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 2
    • 77957133407 scopus 로고    scopus 로고
    • How to strongly link data and its medium: The paper case
    • Bulens, P., Standaert, F.-X., Quisquater, J.-J.: How to strongly link data and its medium: the paper case. IET Inf. Secur. 4(3), 125-136 (2010)
    • (2010) IET Inf. Secur. , vol.4 , Issue.3 , pp. 125-136
    • Bulens, P.1    Standaert, F.-X.2    Quisquater, J.-J.3
  • 4
    • 84857767882 scopus 로고    scopus 로고
    • Efficient implementation of true random number generator based on SRAM PUFs
    • Naccache, D. (ed.) LNCS Springer, Heidelberg
    • van der Leest, V., van der Sluis, E., Schrijen, G.-J., Tuyls, P., Handschuh, H.: Efficient Implementation of True Random Number Generator Based on SRAM PUFs. In: Naccache, D. (ed.) Quisquater Festschrift. LNCS, Vol. 6805, pp. 300-318. Springer, Heidelberg (2012)
    • (2012) Quisquater Festschrift , vol.6805 , pp. 300-318
    • Van Der Leest, V.1    Van Der Sluis, E.2    Schrijen, G.-J.3    Tuyls, P.4    Handschuh, H.5
  • 5
    • 77953492364 scopus 로고    scopus 로고
    • Secure implementation of cryptographic modules. Development of a standard evaluation environment for side channel attacks
    • Satoh, A., Katashita, T., Sakane, H.: Secure implementation of cryptographic modules. Development of a standard evaluation environment for side channel attacks. Synthesiology-English Edition 3(1), 86-95 (2010)
    • (2010) Synthesiology-English Edition , vol.3 , Issue.1 , pp. 86-95
    • Satoh, A.1    Katashita, T.2    Sakane, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.