-
1
-
-
72449124251
-
Memory leakage-resilient encryption based on physically unclonable functions
-
M. Matsui. Proceedings of the15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg
-
F. Armknecht, R. Maes, A.R. Sadeghi, B. Sunar, P. Tuyls, Memory leakage-resilient encryption based on physically unclonable functions, in Advances in Cryptology - ASIACRYPT 2009, ed. by M. Matsui. Proceedings of the15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan. Lecture Notes in Computer Science, vol. 5912 (Springer, Berlin, Heidelberg, 2009), pp. 685-702
-
(2009)
Advances in Cryptology - ASIACRYPT 2009
, vol.5912
, pp. 685-702
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.R.3
Sunar, B.4
Tuyls, P.5
-
4
-
-
51049117293
-
-
CHES, 10-13 August 2008 Washington, DC, USA
-
C. Bösch, J. Guajardo, A.R. Sadeghi, J. Shokrollahi, P. Tuyls, in Efficient Helper Data Key Extractor on FPGA. CHES, 10-13 August 2008 Washington, DC, USA, 2008, pp. 181-197
-
(2008)
Efficient Helper Data Key Extractor on FPGA
, pp. 181-197
-
-
Bösch, C.1
Guajardo, J.2
Sadeghi, A.R.3
Shokrollahi, J.4
Tuyls, P.5
-
5
-
-
77649253940
-
On physical Obfuscation of Cryptographic Algorithms
-
New Delhi, India (Springer, Berlin, Heidelberg
-
J. Bringer, H. Chabanne, T. Icart, in On physical Obfuscation of Cryptographic Algorithms. INDOCRYPT ’09: Proceedings of the 10th International Conference on Cryptology in India, New Delhi, India (Springer, Berlin, Heidelberg, 2009), pp. 88-103
-
(2009)
INDOCRYPT ’09: Proceedings of the 10Th International Conference on Cryptology in India
, pp. 88-103
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
6
-
-
23444435831
-
Forgery: ‘fingerprinting’ documents and packaging
-
J.D.R. Buchanan, R.P. Cowburn, A.V. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D.A. Allwood, M.T. Bryan, Forgery: ‘fingerprinting’ documents and packaging. Nature 436(7050), 475 (2005)
-
(2005)
Nature
, vol.436
, Issue.7050
, pp. 475
-
-
Buchanan, J.D.R.1
Cowburn, R.P.2
Jausovec, A.V.3
Petit, D.4
Seem, P.5
Xiong, G.6
Atkinson, D.7
Fenton, K.8
Allwood, D.A.9
Bryan, M.T.10
-
9
-
-
38049025704
-
RF-DNA: Radio-Frequency Certificates of Authenticity
-
Vienna, Austria, 10-13 September, (Springer, Berlin, Heidelberg 2007)
-
G. Dejean, D. Kirovski, in RF-DNA: Radio-Frequency Certificates of Authenticity. CHES ’07: Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria, 10-13 September 2007 (Springer, Berlin, Heidelberg 2007), pp. 346-363
-
(2007)
CHES ’07: Proceedings of the 9Th International Workshop on Cryptographic Hardware and Embedded Systems
, pp. 346-363
-
-
Dejean, G.1
Kirovski, D.2
-
10
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97-139 (2008)
-
(2008)
SIAM J. Comput
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
12
-
-
46449138830
-
Controlled Physical Random Functions
-
IEEE Computer Society, Washington, DC
-
B. Gassend, D. Clarke, M. van Dijk, S. Devadas, in Controlled Physical Random Functions. ACSAC ’02: Proceedings of the 18th Annual Computer Security Applications Conference (IEEE Computer Society, Washington, DC, 2002), p. 149
-
(2002)
ACSAC ’02: Proceedings of the 18Th Annual Computer Security Applications Conference
, pp. 149
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
13
-
-
0038341105
-
Silicon Physical Random Functions
-
ACM Press, New York, NY
-
B. Gassend, D. Clarke, M. van Dijk, S. Devadas, in Silicon Physical Random Functions. ACM Conference on Computer and Communications Security (ACM Press, New York, NY 2002), pp. 148-160
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
14
-
-
4344587804
-
Identification and authentication of integrated circuits: Research articles
-
B. Gassend, D. Lim, D. Clarke, M. van Dijk, S. Devadas, Identification and authentication of integrated circuits: Research articles. Concurr. Comput.: Pract. Exper. 16(11), 1077-1098 (2004)
-
(2004)
Concurr. Comput.: Pract. Exper
, vol.16
, Issue.11
, pp. 1077-1098
-
-
Gassend, B.1
Lim, D.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
-
15
-
-
38049015807
-
FPGA Intrinsic PUFs and Their Use for IP Protection
-
Springer, Heidelberg
-
J. Guajardo, S.S. Kumar, G.J. Schrijen, P. Tuyls, in FPGA Intrinsic PUFs and Their Use for IP Protection. Cryptographic Hardware and Embedded Systems Workshop. Lecture Notes in Computer Science, vol. 4727 (Springer, Heidelberg, 2007), pp. 63-80
-
(2007)
Cryptographic Hardware and Embedded Systems Workshop. Lecture Notes in Computer Science
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
16
-
-
48149093328
-
Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection
-
27-30 Aug, IEEE, Piscataway, NJ, 2007
-
J. Guajardo, S.S. Kumar, G.J. Schrijen, P. Tuyls, in Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection. International Conference on Field Programmable Logic and Applications, 27-30 Aug 2007 (IEEE, Piscataway, NJ, 2007), pp. 189-195
-
(2007)
International Conference on Field Programmable Logic and Applications
, pp. 189-195
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
17
-
-
62449274873
-
Anticounterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
-
J. Guajardo, B. Škorić, P. Tuyls, S.S. Kumar, T. Bel, A.H. Blom, G.J. Schrijen, Anticounterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions. Inf. Syst. Front. 11(1), 19-41 (2009)
-
(2009)
Inf. Syst. Front
, vol.11
, Issue.1
, pp. 19-41
-
-
Guajardo, J.1
Škorić, B.2
Tuyls, P.3
Kumar, S.S.4
Bel, T.5
Blom, A.H.6
Schrijen, G.J.7
-
18
-
-
70350591237
-
CDs Have Fingerprints Too
-
Springer, Berlin, Heidelberg
-
G. Hammouri, A. Dana, B. Sunar, in CDs Have Fingerprints Too. CHES ’09: Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, Heidelberg, 2009), pp. 348-362
-
(2009)
CHES ’09: Proceedings of the 11Th International Workshop on Cryptographic Hardware and Embedded Systems
, pp. 348-362
-
-
Hammouri, G.1
Dana, A.2
Sunar, B.3
-
19
-
-
57049186627
-
Unclonable Lightweight Authentication Scheme
-
Springer, Heidelberg
-
G. Hammouri, E. Öztürk, B. Birand, B. Sunar, in Unclonable Lightweight Authentication Scheme. Proceedings of the 10th International Conference on Information and Communications Security (ICICS 2008) (Springer, Heidelberg, 2008), pp. 33-48
-
(2008)
Proceedings of the 10Th International Conference on Information and Communications Security (ICICS 2008)
, pp. 33-48
-
-
Hammouri, G.1
Öztürk, E.2
Birand, B.3
Sunar, B.4
-
20
-
-
70350741520
-
A Physical Unclonable Function Defined Using Power Distribution System Equivalent Resistance Variations
-
ACM, New York, NY
-
R. Helinski, D. Acharyya, J. Plusquellic, in A Physical Unclonable Function Defined Using Power Distribution System Equivalent Resistance Variations. DAC ’09: Proceedings of the 46th Annual Design Automation Conference (ACM, New York, NY, 2009), pp. 676-681
-
(2009)
DAC ’09: Proceedings of the 46Th Annual Design Automation Conference
, pp. 676-681
-
-
Helinski, R.1
Acharyya, D.2
Plusquellic, J.3
-
22
-
-
50249134033
-
Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags
-
Malaga, Spain, 11-13
-
D.E. Holcomb, W.P. Burleson, K. Fu, in Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags. Proceedings of the Conference on RFID Security, Malaga, Spain, 11-13 July 2007
-
(2007)
Proceedings of the Conference on RFID Security
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
23
-
-
68949175522
-
-
D.E. Holcomb, W.P. Burleson, K. Fu, Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 58(9), 1198-1210 (2009)
-
(2009)
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
, vol.58
, Issue.9
, pp. 1198-1210
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
25
-
-
38049049008
-
Estimating the Secrecy Rate of Physical Unclonable Functions with the Context-TreeWeighting Method
-
Seattle, WA, USA, 9-14
-
T. Ignatenko, G.J. Schrijen, B. Škorić, P. Tuyls, F.M.J. Willems, in Estimating the Secrecy Rate of Physical Unclonable Functions with the Context-TreeWeighting Method. Proceedings of the IEEE International Symposium on Information Theory, Seattle, WA, USA, 9-14 July 2006, pp. 499-503
-
(2006)
Proceedings of the IEEE International Symposium on Information Theory
, pp. 499-503
-
-
Ignatenko, T.1
Schrijen, G.J.2
Škorić, B.3
Tuyls, P.4
Willems, F.M.J.5
-
27
-
-
85007308475
-
Software Techniques to Combat Drift in PUF-Based Authentication Systems
-
Cologne, Germany
-
M.S. Kirkpatrick, E. Bertino, in Software Techniques to Combat Drift in PUF-Based Authentication Systems. Workshop on Secure Component and System Identification (SECSI 2010), Cologne, Germany, 2010, p. 9
-
(2010)
Workshop on Secure Component and System Identification (SECSI 2010)
, pp. 9
-
-
Kirkpatrick, M.S.1
Bertino, E.2
-
28
-
-
51849144293
-
Extended Abstract: The Butterfly PUF Protecting IP on Every FPGA
-
Anaheim, CA, USA
-
S. Kumar, J. Guajardo, R. Maes, G.J. Schrijen, P. Tuyls, in Extended Abstract: The Butterfly PUF Protecting IP on Every FPGA. IEEE International Workshop on Hardware-Oriented Security and Trust, 2008, HOST 2008, Anaheim, CA, USA, 2008, pp. 67-70
-
(2008)
IEEE International Workshop on Hardware-Oriented Security and Trust, 2008, HOST 2008
, pp. 67-70
-
-
Kumar, S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.J.4
Tuyls, P.5
-
29
-
-
70449096107
-
Reconfigurable Physical Unclonable Functions - Enabling Technology for Tamper-Resistant Storage
-
San Francisco, CA, USA (IEEE Computer Society, Los Alamitos, CA, USA
-
K. Kursawe, A.R. Sadeghi, D. Schellekens, P. Tuyls, B. Škorić, in Reconfigurable Physical Unclonable Functions - Enabling Technology for Tamper-Resistant Storage. 2nd IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2009, San Francisco, CA, USA (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 22-29
-
(2009)
2Nd IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2009
, pp. 22-29
-
-
Kursawe, K.1
Sadeghi, A.R.2
Schellekens, D.3
Tuyls, P.4
Škorić, B.5
-
30
-
-
4544381402
-
-
J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. van Dijk, S. Devadas, in A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Application. Proceedings of the Symposium on VLSI Circuits, 2004, pp. 176-159
-
(2004)
A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Application. Proceedings of the Symposium on VLSI Circuits
, pp. 159-176
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
32
-
-
0034428343
-
IC Identification Circuit Using Device Mismatch
-
K. Lofstrom, W.R. Daasch, D. Taylor, in IC Identification Circuit Using Device Mismatch. Proceedings of ISSCC 2000, 2000, pp. 372-373
-
(2000)
Proceedings of ISSCC
, vol.2000
, pp. 372-373
-
-
Lofstrom, K.1
Daasch, W.R.2
Taylor, D.3
-
33
-
-
77949345944
-
Intrinsic PUFs from Flip-Flops on Reconfigurable Devices
-
Eindhoven, the Netherlands
-
R. Maes, P. Tuyls, I. Verbauwhede, in Intrinsic PUFs from Flip-Flops on Reconfigurable Devices. 3rd Benelux Workshop on Information and System Security (WISSec 2008), Eindhoven, the Netherlands, 2008
-
(2008)
3Rd Benelux Workshop on Information and System Security (Wissec 2008)
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
34
-
-
85019709391
-
Statistical Analysis of Silicon PUF Responses for Device Identification
-
Berlin, Germany
-
R. Maes, P. Tuyls, I. Verbauwhede, in Statistical Analysis of Silicon PUF Responses for Device Identification. Workshop on Secure Component and System Identification (SECSI 2008), Berlin, Germany, 2008
-
(2008)
Workshop on Secure Component and System Identification (SECSI 2008)
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
35
-
-
70350614531
-
Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs
-
Springer, Berlin, Heidelberg
-
R. Maes, P. Tuyls, I. Verbauwhede, in Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs. CHES ’09: Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, Heidelberg 2009), pp. 332-347.
-
(2009)
CHES ’09: Proceedings of the 11Th International Workshop on Cryptographic Hardware and Embedded Systems
, pp. 332-347
-
-
Maes, R.1
Tuyls, P.2
Verbauwhede, I.3
-
36
-
-
85019754158
-
-
MagneTek(R), MagnePrint(R). http://www.magneprint.com/
-
Magneprint(R)
-
-
-
37
-
-
67249147207
-
Testing Techniques for Hardware Security
-
Santa Clara, CA, USA, 28-30 Oct
-
M. Majzoobi, F. Koushanfar, M. Potkonjak, in Testing Techniques for Hardware Security. IEEE International Test Conference (ITC 2008), Santa Clara, CA, USA, 28-30 Oct 2008 pp. 1-10
-
(2008)
IEEE International Test Conference (ITC 2008)
, pp. 1-10
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
38
-
-
76949093125
-
Techniques for design and implementation of secure reconfigurable PUFs
-
M. Majzoobi, F. Koushanfar, M. Potkonjak, Techniques for design and implementation of secure reconfigurable PUFs. ACM Trans. Reconfigurable Technol. Syst. 2(1), 1-33 (2009)
-
(2009)
ACM Trans. Reconfigurable Technol. Syst
, vol.2
, Issue.1
, pp. 1-33
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
39
-
-
51749083449
-
Physical Unclonable Function with Tristate Buffers
-
Seattle, WA, USA (IEEE, Washington, DC
-
E. Ozturk, G. Hammouri, B. Sunar, in Physical Unclonable Function with Tristate Buffers. IEEE International Symposium on Circuits and Systems (ISCAS 2008), Seattle, WA, USA (IEEE, Washington, DC, 2008), pp. 3194-3197
-
(2008)
IEEE International Symposium on Circuits and Systems (ISCAS 2008)
, pp. 3194-3197
-
-
Ozturk, E.1
Hammouri, G.2
Sunar, B.3
-
40
-
-
49149115221
-
Towards Robust Low Cost Authentication for Pervasive Devices
-
IEEE Computer Society, Washington, DC
-
E. Öztürk, G. Hammouri, B. Sunar, in Towards Robust Low Cost Authentication for Pervasive Devices. PERCOM ’08: Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (IEEE Computer Society, Washington, DC, 2008), pp. 170-178
-
(2008)
PERCOM ’08: Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
, pp. 170-178
-
-
Öztürk, E.1
Hammouri, G.2
Sunar, B.3
-
41
-
-
3242749566
-
-
Ph.D. thesis, Massachusetts Institute of Technology
-
R.S. Pappu, Physical One-Way Functions. Ph.D. thesis, Massachusetts Institute of Technology, 2001
-
(2001)
Physical One-Way Functions
-
-
Pappu, R.S.1
-
42
-
-
0037144430
-
Physical one-way functions
-
R.S. Pappu, B. Recht, J. Taylor, N. Gershenfeld, Physical one-way functions. Science 297, 2026-2030 (2002)
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.S.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
43
-
-
78049330638
-
Provable Security for Physical Cryptography
-
Graz, Austria, 7-9
-
K. Pietrzak, in Provable Security for Physical Cryptography. Survey talk at WEWORC’09, Graz, Austria, 7-9 July 2009
-
(2009)
Survey Talk at WEWORC’09
-
-
Pietrzak, K.1
-
44
-
-
78649989155
-
-
Cryptology ePrint Archive, Report 2010/251
-
U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, J. Schmidhuber, Modeling Attacks on Physical Unclonable Functions. Cryptology ePrint Archive, Report 2010/251, 2010. http://eprint.iacr.org/
-
(2010)
Modeling Attacks on Physical Unclonable Functions
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
46
-
-
78751677588
-
-
Cryptology ePrint Archive, Report 2009/278
-
U. Rührmair, Q. Chen, P. Lugli, U. Schlichtmann, G.C. Martin Stutzmann, Towards Electrical, Integrated Implementations of SIMPL Systems. Cryptology ePrint Archive, Report 2009/278, 2009
-
(2009)
Towards Electrical, Integrated Implementations of SIMPL Systems
-
-
Rührmair, U.1
Chen, Q.2
Lugli, P.3
Schlichtmann, U.4
Martin Stutzmann, G.C.5
-
48
-
-
0003822632
-
-
NIST Special Publication 800-22
-
A. Rukhin, J. Soto, J. Nechvatal, E. Barker, S. Leigh, M. Levenson, D. Banks, A. Heckert, J. Dray, S. Vo, M. Smid, M. Vangel, A. Heckert, J. Dray, L.E.B. Iii, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800-22, 2001
-
(2001)
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Barker, E.4
Leigh, S.5
Levenson, M.6
Banks, D.7
Heckert, A.8
Dray, J.9
Vo, S.10
Smid, M.11
Vangel, M.12
Heckert, A.13
Dray, J.14
Iii, L.E.B.15
-
51
-
-
34548818732
-
A 1.6pj/bit 96% Stable Chip-ID Generating Circuit Using Process Variations
-
Digest of Technical Papers (IEEE Computer Society, Washington, DC
-
Y. Su, J. Holleman, B. Otis, in A 1.6pj/bit 96% Stable Chip-ID Generating Circuit Using Process Variations. IEEE International Solid-State Circuits Conference, ISSCC 2007. Digest of Technical Papers (IEEE Computer Society, Washington, DC, 2007), pp. 406-611
-
(2007)
IEEE International Solid-State Circuits Conference, ISSCC 2007
, pp. 406-611
-
-
Su, Y.1
Holleman, J.2
Otis, B.3
-
52
-
-
34547307341
-
Physical Unclonable Functions for Device Authentication and Secret Key Generation
-
ACM Press, New York, NY
-
G.E. Suh, S. Devadas, in Physical Unclonable Functions for Device Authentication and Secret Key Generation. Design Automation Conference (ACM Press, New York, NY, 2007), pp. 9-14
-
(2007)
Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
54
-
-
33750726983
-
Read-Proof Hardware from Protective Coatings
-
Springer, New York, NY
-
P. Tuyls, G.J. Schrijen, B. Škorić, J. van Geloven, N. Verhaegh, R. Wolters, in Read-Proof Hardware from Protective Coatings. Cryptographic Hardware and Embedded Systems Workshop. Lecture Notes in Computer Science, vol. 4249 (Springer, New York, NY, 2006), pp. 369-383
-
(2006)
Cryptographic Hardware and Embedded Systems Workshop. Lecture Notes in Computer Science
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.J.2
Škorić, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
55
-
-
84883043872
-
-
ISSE 2006 - Securing Electronic Business Processes, Rome, Italy, 10-12
-
P. Tuyls, B. Škorić, in Physical Unclonable Functions for Enhanced Security of Tokens and Tags. ISSE 2006 - Securing Electronic Business Processes, Rome, Italy, 10-12 Oct 2006, pp. 30-37
-
(2006)
In Physical Unclonable Functions for Enhanced Security of Tokens and Tags
, pp. 30-37
-
-
Tuyls, P.1
Škorić, B.2
-
56
-
-
26444487655
-
Information-Theoretic Security Analysis of Physical Unclonable Functions
-
Roseau, Dominica, 28 Feb-3
-
P. Tuyls, B. Škorić, S. Stallinga, A.H.M. Akkermans, W. Ophey, in Information-Theoretic Security Analysis of Physical Unclonable Functions. Financial Cryptography and Data Security, Roseau, Dominica, 28 Feb-3 Mar 2005, pp. 141-155
-
(2005)
Financial Cryptography and Data Security
, pp. 141-155
-
-
Tuyls, P.1
Škorić, B.2
Stallinga, S.3
Akkermans, A.H.M.4
Ophey, W.5
-
57
-
-
70449120146
-
In Circuit-Level Techniques for Reliable Physically Unclonable Functions
-
San Francisco, CA, USA, 27
-
V. Vivekraja, L. Nazhandali, in Circuit-Level Techniques for Reliable Physically Unclonable Functions. HOST ’09: Proceedings of the 2009 IEEE International Workshop on Hardware- Oriented Security and Trust, San Francisco, CA, USA, 27 July 2009, pp. 30-35
-
(2009)
HOST ’09: Proceedings of the 2009 IEEE International Workshop on Hardware- Oriented Security and Trust
, pp. 30-35
-
-
Vivekraja, V.1
Nazhandali, L.2
-
59
-
-
33746785063
-
Information-theoretic analysis of capacitive physical unclonable functions
-
B. Škorić, S. Maubach, T. Kevenaar, P. Tuyls, Information-theoretic analysis of capacitive physical unclonable functions. J. Appl. Phys. 100(2), 024902 (2006)
-
(2006)
J. Appl. Phys
, vol.100
, Issue.2
-
-
Škorić, B.1
Maubach, S.2
Kevenaar, T.3
Tuyls, P.4
-
60
-
-
26444544536
-
Robust Key Extraction from Physical Unclonable Functions
-
Springer, Berlin
-
B. Škorić, P. Tuyls, W. Ophey, in Robust Key Extraction from Physical Unclonable Functions. Applied Cryptography and Network Security (ACNS) 2005, New York, NY, USA. Lecture Notes in Computer Science, vol. 3531 (Springer, Berlin, 2005), pp. 407-422
-
(2005)
Applied Cryptography and Network Security (ACNS) 2005, New York, NY, USA. Lecture Notes in Computer Science
, vol.3531
, pp. 407-422
-
-
Škorić, B.1
Tuyls, P.2
Ophey, W.3
-
62
-
-
70449134837
-
Temperature-Aware Cooperative Ring Oscillator PUF
-
IEEE Computer Society, Washington, DC
-
C.E. Yin, G. Qu, in Temperature-Aware Cooperative Ring Oscillator PUF. HOST ’09: Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust (IEEE Computer Society, Washington, DC, 2009), pp. 36-42
-
(2009)
HOST ’09: Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust
, pp. 36-42
-
-
Yin, C.E.1
Qu, G.2
|