STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
The security of the cipher block chaining message authentication code
Journal of Computer and System Sciences
Cryptographic rights management of FPGA intellectual property cores
FPGA '02 Proceedings of the 2002 ACM/SIGDA tenth international symposium on Field-programmable gate arrays
Silicon physical random functions
Proceedings of the 9th ACM conference on Computer and communications security
Low-Power Digital VLSI Design Circuits and Systems
Low-Power Digital VLSI Design Circuits and Systems
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
LFSR-based Hashing and Authentication
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
On Fast and Provably Secure Message Authentication Based on Universal Hashing
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Does Encryption with Redundancy Provide Authenticity?
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Encryption Modes with Almost Free Message Integrity
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Controlled Physical Random Functions
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
OCB: A block-cipher mode of operation for efficient authenticated encryption
ACM Transactions on Information and System Security (TISSEC)
Energy Scalable Universal Hashing
IEEE Transactions on Computers
Data remanence in semiconductor devices
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Secure deletion of data from magnetic and solid-state memory
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Software performance of universal hash functions
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Extracting secret keys from integrated circuits
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Offline hardware/software authentication for reconfigurable platforms
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Read-proof hardware from protective coatings
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Robust key extraction from physical uncloneable functions
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
The context-tree weighting method: basic properties
IEEE Transactions on Information Theory
Embedded Trusted Computing with Authenticated Non-volatile Memory
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Efficient Helper Data Key Extractor on FPGAs
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Novel PUF-Based Error Detection Methods in Finite State Machines
Information Security and Cryptology --- ICISC 2008
Robust Authentication Using Physically Unclonable Functions
ISC '09 Proceedings of the 12th International Conference on Information Security
Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On Physical Obfuscation of Cryptographic Algorithms
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
PUF-Based Authentication Protocols --- Revisited
Information Security Applications
Low-power sub-threshold design of secure physical unclonable functions
Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design
PUF ROKs: generating read-once keys from physically unclonable functions
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Modeling attacks on physical unclonable functions
Proceedings of the 17th ACM conference on Computer and communications security
Hardware intrinsic security from D flip-flops
Proceedings of the fifth ACM workshop on Scalable trusted computing
Novel physical unclonable function with process and environmental variations
Proceedings of the Conference on Design, Automation and Test in Europe
Improving the quality of ring oscillator PUFs on FPGAs
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Oblivious transfer based on physical unclonable functions
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
An alternative to error correction for SRAM-like PUFs
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
The glitch PUF: a new delay-PUF architecture exploiting glitch shapes
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
A PUF design for secure FPGA-based embedded systems
Proceedings of the 2010 Asia and South Pacific Design Automation Conference
FPGA time-bounded unclonable authentication
IH'10 Proceedings of the 12th international conference on Information hiding
Enforcing physically restricted access control for remote data
Proceedings of the first ACM conference on Data and application security and privacy
SIMPL systems, or: can we design cryptographic hardware without secret key information?
SOFSEM'11 Proceedings of the 37th international conference on Current trends in theory and practice of computer science
System accuracy estimation of SRAM-based device authentication
Proceedings of the 16th Asia and South Pacific Design Automation Conference
Integrated circuit design for physical unclonable function using differential amplifiers
Analog Integrated Circuits and Signal Processing
PUF ROKs: a hardware approach to read-once keys
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Physically unclonable functions: manufacturing variability as an unclonable device identifier
Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI
Sharp lower bounds on the extractable randomness from non-uniform sources
Information and Computation
Coalition resistant anonymous broadcast encryption scheme based on PUF
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
A practical device authentication scheme using SRAM PUFs
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Extracting device fingerprints from flash memory by exploiting physical variations
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Physically uncloneable functions in the universal composition framework
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Lightweight and secure PUF key storage using limits of machine learning
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Recyclable PUFs: logically reconfigurable PUFs
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
MECCA: a robust low-overhead PUF using embedded memory array
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Logically reconfigurable PUFs: memory-based secure key storage
Proceedings of the sixth ACM workshop on Scalable trusted computing
Semi-invasive EM attack on FPGA RO PUFs and countermeasures
WESS '11 Proceedings of the Workshop on Embedded Systems Security
Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs)
Proceedings of the 18th ACM conference on Computer and communications security
An analysis of delay based PUF implementations on FPGA
ARC'10 Proceedings of the 6th international conference on Reconfigurable Computing: architectures, Tools and Applications
Using Data Contention in Dual-ported Memories for Security Applications
Journal of Signal Processing Systems
Security applications of diodes with unique current-voltage characteristics
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Quantum readout of physical unclonable functions
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Efficient implementation of true random number generator based on SRAM PUFs
Cryptography and Security
SIMPL systems as a keyless cryptographic and security primitive
Cryptography and Security
An attack on PUF-Based session key exchange and a hardware-based countermeasure: erasable PUFs
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
A zero-overhead IC identification technique using clock sweeping and path delay analysis
Proceedings of the great lakes symposium on VLSI
International Journal of Reconfigurable Computing - Special issue on Selected Papers from the International Conference on Reconfigurable Computing and FPGAs (ReConFig'10)
Proceedings of the 49th Annual Design Automation Conference
Securely sealing Multi-FPGA systems
ARC'12 Proceedings of the 8th international conference on Reconfigurable Computing: architectures, tools and applications
A formal definition and a new security mechanism of physical unclonable functions
MMB'12/DFT'12 Proceedings of the 16th international GI/ITG conference on Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance
International Journal of Reconfigurable Computing - Special issue on Selected Papers from the International Conference on Reconfigurable Computing and FPGAs (ReConFig'10)
Comparison of SRAM and FF PUF in 65nm technology
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Evaluation of a PUF device authentication scheme on a discrete 0.13um SRAM
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Clockless physical unclonable functions
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Converse PUF-Based authentication
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
PUF-enhanced offline RFID security and privacy
Journal of Network and Computer Applications
Practical security analysis of PUF-based two-player protocols
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Soft decision error correction for compact memory-based PUFs using a single enrollment
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
PUFKY: a fully functional PUF-based cryptographic key generator
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Security analysis of image-based PUFs for anti-counterfeiting
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Performance and security evaluation of AES s-box-based glitch PUFs on FPGAs
SPACE'12 Proceedings of the Second international conference on Security, Privacy, and Applied Cryptography Engineering
DRV-Fingerprinting: using data retention voltage of SRAM cells for chip identification
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Design and implementation of a group-based RO PUF
Proceedings of the Conference on Design, Automation and Test in Europe
ClockPUF: physical unclonable functions based on clock networks
Proceedings of the Conference on Design, Automation and Test in Europe
Memristor PUFs: a new generation of memory-based physically unclonable functions
Proceedings of the Conference on Design, Automation and Test in Europe
Anti-counterfeiting with hardware intrinsic security
Proceedings of the Conference on Design, Automation and Test in Europe
Evaluation of delay PUFs on CMOS 65 nm technology: ASIC vs FPGA
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
An FPGA chip identification generator using configurable ring oscillators
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
CLIP: circuit level IC protection through direct injection of process variations
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Comparative analysis of SRAM memories used as PUF primitives
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
Characterization of the bistable ring PUF
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Bias-based modeling and entropy analysis of PUFs
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Secure PRNG seeding on commercial off-the-shelf microcontrollers
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Digital fingerprints for low-cost platforms using MEMS sensors
Proceedings of the Workshop on Embedded Systems Security
Strong PUFs and their (physical) unpredictability: a case study with power PUFs
Proceedings of the Workshop on Embedded Systems Security
Proceedings of the 3rd international workshop on Trustworthy embedded devices
An accurate probabilistic reliability model for silicon PUFs
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
A high reliability PUF using hot carrier injection based response reinforcement
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 0.00 |
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. In [34], Simpson and Schaumont proposed a fundamentally different approach to IP protection on FPGAs based on the use of Physical Unclonable Functions (PUFs). Their work only assumes the existence of a PUF on the FPGAs without actually proposing a PUF construction. In this paper, we propose new protocols for the IP protection problem on FPGAs and provide the first construction of a PUF intrinsic to current FPGAs based on SRAM memory randomness present on current FPGAs. We analyze SRAM-based PUF statistical properties and investigate the trade offs that can be made when implementing a fuzzy extractor.