A practical device authentication scheme using SRAM PUFs
暂无分享,去创建一个
Wei Wu | Marcin Wójcik | Roel Maes | Jiangtao Li | Claire Vishik | Patrick Koeberl | Anand Rajan | Roel Maes | Wei Wu | Jiangtao Li | Patrick Koeberl | Anand Rajan | Claire Vishik | Marcin Wójcik
[1] Rodham E. Tulloss,et al. The Test Access Port and Boundary Scan Architecture , 1990 .
[2] Dirk Fox,et al. Digital Signature Standard (DSS) , 2001, Datenschutz und Datensicherheit.
[3] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[4] Srinivas Devadas,et al. Controlled physical random functions , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[5] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[6] Yevgeniy Dodis,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.
[7] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[8] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[9] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[10] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[11] Ingrid Verbauwhede,et al. Intrinsic PUFs from Flip-flops on Reconfigurable Devices , 2008 .
[12] P. Tuyls,et al. PUF-PRFs : A New Tamper-resilient Cryptographic Primitive , 2009 .
[13] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.
[14] Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions , 2010, Towards Hardware-Intrinsic Security.
[15] John Neumann,et al. Defense Supplier Base: DOD Should Leverage Ongoing Initiatives in Developing Its Program to Mitigate Risk of Counterfeit Parts , 2010 .
[16] Helena Handschuh,et al. Hardware intrinsic security from D flip-flops , 2010, STC '10.
[17] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.
[18] Marcin Wójcik,et al. Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM , 2011, INTRUST.