-
1
-
-
84889009632
-
Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes
-
M. Hiller, M. Weiner, L. R. Lima, M. Birkner, and G. Sigl, "Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes, " in Proc. Int. Workshop Trustworthy Embedded Devices (TrustED), 2013, pp. 43-54.
-
(2013)
Proc. Int. Workshop Trustworthy Embedded Devices (TrustED)
, pp. 43-54
-
-
Hiller, M.1
Weiner, M.2
Lima, L.R.3
Birkner, M.4
Sigl, G.5
-
3
-
-
0038341105
-
Silicon physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon physical random functions, " in Proc. ACM Conf. Comput. Commun. Secur. (CCS), 2002, pp. 148-160.
-
(2002)
Proc. ACM Conf. Comput. Commun. Secur. (CCS)
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
4
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Oct
-
D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, "Extracting secret keys from integrated circuits, " IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 13, no. 10, pp. 1200-1205, Oct. 2005.
-
(2005)
IEEE Trans. Very Large Scale Integr. (VLSI) Syst
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
5
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
Jun
-
G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation, " in Proc. ACM/IEEE Design Autom. Conf. (DAC), Jun. 2007, pp. 9-14.
-
(2007)
Proc. ACM/IEEE Design Autom. Conf. (DAC)
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
6
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
P. Paillier and I. Verbauwhede, Eds. Heidelberg, Germany: Springer
-
J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection, " in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science), vol. 4727, P. Paillier and I. Verbauwhede, Eds. Heidelberg, Germany: Springer, 2007, pp. 63-80.
-
(2007)
Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science)
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
7
-
-
84866642869
-
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
-
E. Prouff and P. Schaumont, Eds. Heidelberg, Germany: Springer
-
S. Katzenbeisser, Ü. Kocabaş, V. Rožić, A.-R. Sadeghi, I. Verbauwhede, and C. Wachsmann, "PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon, " in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science), vol. 7428, E. Prouff and P. Schaumont, Eds. Heidelberg, Germany: Springer, 2012, pp. 283-301.
-
(2012)
Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science)
, vol.7428
, pp. 283-301
-
-
Katzenbeisser, S.1
Kocabaş, Ü.2
Rožić, V.3
Sadeghi, A.-R.4
Verbauwhede, I.5
Wachsmann, C.6
-
8
-
-
70449487684
-
A soft decision helper data algorithm for SRAM PUFs
-
Jun./Jul
-
R. Maes, P. Tuyls, and I. Verbauwhede, "A soft decision helper data algorithm for SRAM PUFs, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun./Jul. 2009, pp. 2101-2105.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2101-2105
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
9
-
-
84919478215
-
-
Ph.D. Dissertation, Dept. Elect. Eng., Katholieke Universiteit Leuven, Leuven, Belgium
-
M. Roel, "Physically unclonable functions: Constructions, properties and applications, " Ph.D. Dissertation, Dept. Elect. Eng., Katholieke Universiteit Leuven, Leuven, Belgium, 2012.
-
(2012)
Physically Unclonable Functions: Constructions, Properties and Applications
-
-
Roel, M.1
-
10
-
-
84883702704
-
A new model for estimating bit error probabilities of ring-oscillator PUFs
-
M. Hiller, G. Sigl, and M. Pehl, "A new model for estimating bit error probabilities of ring-oscillator PUFs, " in Proc. Int. Workshop Reconfigurable Commun.-Centric Syst.-Chip (ReCoSoC), 2013, pp. 1-8.
-
(2013)
Proc. Int. Workshop Reconfigurable Commun.-Centric Syst.-Chip (ReCoSoC)
, pp. 1-8
-
-
Hiller, M.1
Sigl, G.2
Pehl, M.3
-
12
-
-
70350614531
-
Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs
-
C. Clavier and K. Gaj, Eds. Heidelberg, Germany: Springer
-
R. Maes, P. Tuyls, and I. Verbauwhede, "Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs, " in Cryptographic Hardware and Embedded Systems, C. Clavier and K. Gaj, vol. 5747, Eds. Heidelberg, Germany: Springer, 2009, pp. 332-347.
-
(2009)
Cryptographic Hardware and Embedded Systems
, vol.5747
, pp. 332-347
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
13
-
-
84905981398
-
Bit selection algorithm suitable for high-volume production of SRAMPUF
-
May
-
K. Xiao, M. T. Rahman, D. Forte, Y. Huang, M. Su, and M. Tehranipoor, "Bit selection algorithm suitable for high-volume production of SRAMPUF, " in Proc. IEEE Int. Symp. Hardw.-Oriented Secur. Trust (HOST), May 2014, pp. 101-106.
-
(2014)
Proc. IEEE Int. Symp. Hardw.-Oriented Secur. Trust (HOST)
, pp. 101-106
-
-
Xiao, K.1
Rahman, M.T.2
Forte, D.3
Huang, Y.4
Su, M.5
Tehranipoor, M.6
-
15
-
-
72449124251
-
Memory leakage-resilient encryption based on physically unclonable functions
-
M. Matsui, Ed. Berlin, Germany: Springer
-
F. Armknecht, R. Maes, A.-R. Sadeghi, B. Sunar, and P. Tuyls, "Memory leakage-resilient encryption based on physically unclonable functions, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 5912, M. Matsui, Ed. Berlin, Germany: Springer, 2009, pp. 685-702.
-
(2009)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.5912
, pp. 685-702
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.-R.3
Sunar, B.4
Tuyls, P.5
-
16
-
-
76949095784
-
Secure and robust error correction for physical unclonable functions
-
Jan./Feb
-
M.-D. Yu and S. Devadas, "Secure and robust error correction for physical unclonable functions, " IEEE Des. Test Comput., vol. 27, no. 1, pp. 48-65, Jan./Feb. 2010.
-
(2010)
IEEE Des. Test Comput
, vol.27
, Issue.1
, pp. 48-65
-
-
Yu, M.-D.1
Devadas, S.2
-
17
-
-
84864149092
-
Complementary IBS: Application specific error correction for PUFs
-
Jun
-
M. Hiller, D. Merli, F. Stumpf, and G. Sigl, "Complementary IBS: Application specific error correction for PUFs, " in Proc. IEEE Int. Symp. Hardw.-Oriented Secur. Trust (HOST), Jun. 2012, pp. 1-6.
-
(2012)
Proc. IEEE Int. Symp. Hardw.-Oriented Secur. Trust (HOST)
, pp. 1-6
-
-
Hiller, M.1
Merli, D.2
Stumpf, F.3
Sigl, G.4
-
18
-
-
51049117293
-
Efficient helper data key extractor on FPGAs
-
E. Oswald and P. Rohatgi, Eds. Heidelberg, Germany: Springer
-
C. Bösch, J. Guajardo, A.-R. Sadeghi, J. Shokrollahi, and P. Tuyls, "Efficient helper data key extractor on FPGAs, " in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science), vol. 5154, E. Oswald and P. Rohatgi, Eds. Heidelberg, Germany: Springer, 2008, pp. 181-197.
-
(2008)
Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science)
, vol.5154
, pp. 181-197
-
-
Bösch, C.1
Guajardo, J.2
Sadeghi, A.-R.3
Shokrollahi, J.4
Tuyls, P.5
-
20
-
-
84930506995
-
Helper data algorithms for PUF-based key generation: Overview and analysis
-
Jun
-
J. Delvaux, D. Gu, D. Schellekens, and I. Verbauwhede, "Helper data algorithms for PUF-based key generation: Overview and analysis, " IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 34, no. 6, pp. 889-902, Jun. 2014.
-
(2014)
IEEE Trans. Comput.-Aided Design Integr. Circuits Syst
, vol.34
, Issue.6
, pp. 889-902
-
-
Delvaux, J.1
Gu, D.2
Schellekens, D.3
Verbauwhede, I.4
-
22
-
-
46849113249
-
Topics in multi-user information theory
-
G. Kramer, "Topics in multi-user information theory, " Found. Trends Commun. Inf. Theory, vol. 4, nos. 4-5, pp. 265-444, 2007.
-
(2007)
Found. Trends Commun. Inf. Theory
, vol.4
, Issue.4-5
, pp. 265-444
-
-
Kramer, G.1
-
23
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
C. Cachin and J. L. Camenisch, Eds. Heidelberg, Germany: Springer
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3027, C. Cachin and J. L. Camenisch, Eds. Heidelberg, Germany: Springer, 2004, pp. 523-540.
-
(2004)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
24
-
-
84866653410
-
Soft decision error correction for compact memory-based PUFs using a single enrollment
-
E. Prouff and P. Schaumont, Eds. Heidelberg, Germany: Springer
-
V. van der Leest, B. Preneel, and E. van der Sluis, "Soft decision error correction for compact memory-based PUFs using a single enrollment, " in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science), vol. 7428, E. Prouff and P. Schaumont, Eds. Heidelberg, Germany: Springer, 2012, pp. 268-282.
-
(2012)
Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science)
, vol.7428
, pp. 268-282
-
-
Leest Der Van, V.1
Preneel, B.2
Sluis Der Van, E.3
-
25
-
-
84942528307
-
Error correction for physical unclonable functions using generalized concatenated codes
-
S. Müelich, S. Puchinger, M. Bossert, M. Hiller, and G. Sigl, "Error correction for physical unclonable functions using generalized concatenated codes." in Proc. Int. Workshop Algebraic Combinat. Coding Theory (ACCT), 2014.
-
(2014)
Proc. Int. Workshop Algebraic Combinat. Coding Theory (ACCT)
-
-
Müelich, S.1
Puchinger, S.2
Bossert, M.3
Hiller, M.4
Sigl, G.5
-
26
-
-
84957026628
-
Low-area Reed decoding in a generalized concatenated code construction for PUFs
-
Jul
-
M. Hiller, L. Kurzinger, G. Sigl, S. Muelich, S. Puchinger, and M. Bossert, "Low-area Reed decoding in a generalized concatenated code construction for PUFs, " in Proc. IEEE Comput. Soc. Annu. Symp. VLSI (ISVLSI), Jul. 2015, pp. 143-148.
-
(2015)
Proc. IEEE Comput. Soc. Annu. Symp. VLSI (ISVLSI)
, pp. 143-148
-
-
Hiller, M.1
Kurzinger, L.2
Sigl, G.3
Muelich, S.4
Puchinger, S.5
Bossert, M.6
-
27
-
-
85084018824
-
On error correction for physical unclonable functions
-
S. Puchinger, S. Müelich, M. Bossert, M. Hiller, and G. Sigl, "On error correction for physical unclonable functions, " in Proc. Int. ITG Conf. Syst., Commun. Coding (SCC), 2015, pp. 1-6.
-
(2015)
Proc. Int. ITG Conf. Syst., Commun. Coding (SCC)
, pp. 1-6
-
-
Puchinger, S.1
Müelich, S.2
Bossert, M.3
Hiller, M.4
Sigl, G.5
-
28
-
-
84866726878
-
PUFKY: A fully functional PUF-based cryptographic key generator
-
E. Prouff and P. Schaumont, Eds. Heidelberg, Germany: Springer
-
R. Maes, A. Van Herrewege, and I. Verbauwhede, "PUFKY: A fully functional PUF-based cryptographic key generator, " in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science), vol. 7428, E. Prouff and P. Schaumont, Eds. Heidelberg, Germany: Springer, 2012, pp. 302-319.
-
(2012)
Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science)
, vol.7428
, pp. 302-319
-
-
Maes, R.1
Van Herrewege, A.2
Verbauwhede, I.3
-
29
-
-
84981296620
-
Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions
-
to be published
-
C. Herder, L. Ren, M. van Dijk, M.-D. Yu, and S. Devadas, "Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions, " IEEE Trans. Dependable Secure Comput., to be published.
-
IEEE Trans. Dependable Secure Comput
-
-
Herder, C.1
Ren, L.2
Van Dijk, M.3
Yu, M.-D.4
Devadas, S.5
-
30
-
-
84942516507
-
Systematic low leakage coding for physical unclonable functions
-
M. Hiller, M.-D. Yu, and M. Pehl, "Systematic low leakage coding for physical unclonable functions, " in Proc. ACM Symp. Inf., Comput. Commun. Secur. (ASIACCS), 2015, pp. 155-166.
-
(2015)
Proc. ACM Symp. Inf., Comput. Commun. Secur. (ASIACCS)
, pp. 155-166
-
-
Hiller, M.1
Yu, M.-D.2
Pehl, M.3
-
31
-
-
80053502788
-
Lightweight and secure PUF key storage using limits of machine learning
-
B. Preneel and T. Takagi, Eds. Heidelberg, Germany: Springer
-
M.-D. Yu, D. M'Raihi, R. Sowell, and S. Devadas, "Lightweight and secure PUF key storage using limits of machine learning, " in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science), vol. 6917, B. Preneel and T. Takagi, Eds. Heidelberg, Germany: Springer, 2011, pp. 358-373.
-
(2011)
Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science)
, vol.6917
, pp. 358-373
-
-
Yu, M.-D.1
M'Raihi, D.2
Sowell, R.3
Devadas, S.4
-
32
-
-
84864153887
-
Performance metrics and empirical results of a PUF cryptographic key generation ASIC
-
Jun
-
M.-D. Yu, R. Sowell, A. Singh, D. M'Raihi, and S. Devadas, "Performance metrics and empirical results of a PUF cryptographic key generation ASIC, " in Proc. IEEE Int. Symp. Hardw.-Oriented Secur. Trust (HOST), Jun. 2012, pp. 108-115.
-
(2012)
Proc. IEEE Int. Symp. Hardw.-Oriented Secur. Trust (HOST)
, pp. 108-115
-
-
Yu, M.-D.1
Sowell, R.2
Singh, A.3
M'Raihi, D.4
Devadas, S.5
-
33
-
-
84866664675
-
Reliability bound and channel capacity of IBS-based fuzzy embedders
-
M. Hiller, F. De Santis, D. Merli, and G. Sigl, "Reliability bound and channel capacity of IBS-based fuzzy embedders, " in Proc. NASA/ESA Conf. Adapt. Hardw. Syst. (AHS), 2012, pp. 213-220.
-
(2012)
Proc. NASA/ESA Conf. Adapt. Hardw. Syst. (AHS)
, pp. 213-220
-
-
Hiller, M.1
De Santis, F.2
Merli, D.3
Sigl, G.4
-
34
-
-
84865684142
-
Evaluation of a PUF device authentication scheme on a discrete 0.13 μm SRAM
-
P. Koeberl, J. Li, R. Maes, A. Rajan, C. Vishik, and M. Wójcik, "Evaluation of a PUF device authentication scheme on a discrete 0.13 μm SRAM, " in Proc. Int. Conf. Trusted Syst. (INTRUST), 2011, pp. 271-288.
-
(2011)
Proc. Int. Conf. Trusted Syst. (INTRUST)
, pp. 271-288
-
-
Koeberl, P.1
Li, J.2
Maes, R.3
Rajan, A.4
Vishik, C.5
Wójcik, M.6
-
35
-
-
84942578562
-
Maximum-likelihood decoding of device-specific multi-bit symbols for reliable key generation
-
May
-
M.-D. Yu, M. Hiller, and S. Devadas, "Maximum-likelihood decoding of device-specific multi-bit symbols for reliable key generation, " in Proc. IEEE Int. Symp. Hardw.-Oriented Secur. Trust (HOST), May 2015, pp. 38-43.
-
(2015)
Proc. IEEE Int. Symp. Hardw.-Oriented Secur. Trust (HOST)
, pp. 38-43
-
-
Yu, M.-D.1
Hiller, M.2
Devadas, S.3
-
36
-
-
51049113719
-
-
M.S. thesis, Dept. Elect. Eng. Inf. Sci., Ruhr Univ. Bochum, Bochum, Germany
-
C. Bösch, "Efficient fuzzy extractors for reconfigurable hardware, " M.S. thesis, Dept. Elect. Eng. Inf. Sci., Ruhr Univ. Bochum, Bochum, Germany, 2008.
-
(2008)
Efficient Fuzzy Extractors for Reconfigurable Hardware
-
-
Bösch, C.1
-
37
-
-
84864150667
-
-
Diplomarbeit, Ulm Univ., Ulm, Germany
-
M. Hiller, "Optimized fuzzy extractor for PUFs on FPGAs, " Diplomarbeit, Ulm Univ., Ulm, Germany, 2011.
-
(2011)
Optimized Fuzzy Extractor for PUFs on FPGAs
-
-
Hiller, M.1
-
38
-
-
84930881609
-
Run-length encodings
-
Jul
-
S. W. Golomb, "Run-length encodings, " IEEE Trans. Inf. Theory, vol. 12, no. 3, pp. 399-401, Jul. 1966.
-
(1966)
IEEE Trans. Inf. Theory
, vol.12
, Issue.3
, pp. 399-401
-
-
Golomb, S.W.1
-
39
-
-
84889009144
-
An accurate probabilistic reliability model for silicon PUFs
-
G. Bertoni and J.-S. Coron, Eds. Heidelberg, Germany: Springer
-
R. Maes, "An accurate probabilistic reliability model for silicon PUFs, " in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science), G. Bertoni and J.-S. Coron, Eds. Heidelberg, Germany: Springer, 2013, pp. 73-89.
-
(2013)
Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science)
, pp. 73-89
-
-
Maes, R.1
-
40
-
-
64149093297
-
Channel coding: The road to channel capacity
-
Jun
-
D. J. Costello, Jr., and G. D. Forney, "Channel coding: The road to channel capacity, " Proc. IEEE, vol. 95, no. 6, pp. 1150-1177, Jun. 2007.
-
(2007)
Proc. IEEE
, vol.95
, Issue.6
, pp. 1150-1177
-
-
Costello, D.J.1
Forney, G.D.2
-
41
-
-
84935113569
-
Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
-
Apr
-
A. J. Viterbi, "Error bounds for convolutional codes and an asymptotically optimum decoding algorithm, " IEEE Trans. Inf. Theory, vol. 13, no. 2, pp. 260-269, Apr. 1967.
-
(1967)
IEEE Trans. Inf. Theory
, vol.13
, Issue.2
, pp. 260-269
-
-
Viterbi, A.J.1
-
43
-
-
84928796196
-
Seesaw: An area optimized FPGA Viterbi decoder for PUFs
-
Aug
-
M. Hiller, L. Rodrigues Lima, and G. Sigl, "Seesaw: An area optimized FPGA Viterbi decoder for PUFs, " in Proc. IEEE Euromicro Conf. Digit. Syst. Design (DSD), Aug. 2014, pp. 387-393.
-
(2014)
Proc. IEEE Euromicro Conf. Digit. Syst. Design (DSD)
, pp. 387-393
-
-
Hiller, M.1
Rodrigues Lima, L.2
Sigl, G.3
-
44
-
-
80053502266
-
SPONGENT: A lightweight hash function
-
B. Preneel and T. Takagi, Eds. Heidelberg, Germany: Springer
-
A. Bogdanov, M. Knežević, G. Leander, D. Toz, K. Varici, and I. Verbauwhede, "SPONGENT: A lightweight hash function, " in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science), vol. 6917, B. Preneel and T. Takagi, Eds. Heidelberg, Germany: Springer, 2011, pp. 312-325.
-
(2011)
Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science)
, vol.6917
, pp. 312-325
-
-
Bogdanov, A.1
Knežević, M.2
Leander, G.3
Toz, D.4
Varici, K.5
Verbauwhede, I.6
-
45
-
-
84946692411
-
A systematic study of lightweight hash functions on FPGAs
-
Dec
-
B. Jungk, L. R. Lima, and M. Hiller, "A systematic study of lightweight hash functions on FPGAs, " in Proc. IEEE Int. Conf. Reconfigurable Comput. FPGAs (ReConFig), Dec. 2014, pp. 1-6.
-
(2014)
Proc. IEEE Int. Conf. Reconfigurable Comput. FPGAs (ReConFig)
, pp. 1-6
-
-
Jungk, B.1
Lima, L.R.2
Hiller, M.3
|