Sciweavers

48 search results - page 1 / 10
» Information-Theoretic Security Analysis of Physical Unclonea...
Sort
View
FC
2005
Springer
99views Cryptology» more  FC 2005»
13 years 10 months ago
Information-Theoretic Security Analysis of Physical Uncloneable Functions
Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M....
DAC
2010
ACM
13 years 8 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
13 years 5 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...
TRUST
2010
Springer
13 years 10 months ago
Oblivious Transfer Based on Physical Unclonable Functions
us Transfer based on Physical Unclonable Functions (Extended Abstract)" Session 2 (Tuesday 15:00 - 16:30) Place: „Salon Tiergarten“ 15:00-15:30 Patrick Koeberl (Intel; Ire...
Ulrich Rührmair
IJISEC
2010
121views more  IJISEC 2010»
13 years 3 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes