Building a high-performance, programmable secure coprocessor
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
Modeling and forecasting of manufacturing variations (embedded tutorial)
Proceedings of the 2001 Asia and South Pacific Design Automation Conference
Silicon physical random functions
Proceedings of the 9th ACM conference on Computer and communications security
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
Controlled Physical Random Functions
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions
Proceedings of the 32nd annual international symposium on Computer Architecture
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Information-theoretic security analysis of physical uncloneable functions
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Robust key extraction from physical uncloneable functions
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Aegis: A Single-Chip Secure Processor
IEEE Design & Test
EPIC: ending piracy of integrated circuits
Proceedings of the conference on Design, automation and test in Europe
Towards trojan-free trusted ICs: problem analysis and detection scheme
Proceedings of the conference on Design, automation and test in Europe
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
LOCS: a low overhead profiler-driven design flow for security of MPSoCs
CODES+ISSS '08 Proceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity
Proceedings of the 1st ACM workshop on Virtual machine security
Guest Editors’ Introduction to Security in Reconfigurable Systems Design
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
Techniques for Design and Implementation of Secure Reconfigurable PUFs
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design
Physical unclonable function and true random number generator: a compact and scalable implementation
Proceedings of the 19th ACM Great Lakes symposium on VLSI
Robust Authentication Using Physically Unclonable Functions
ISC '09 Proceedings of the 12th International Conference on Information Security
Proceedings of the 46th Annual Design Automation Conference
Hardware authentication leveraging performance limits in detailed simulations and emulations
Proceedings of the 46th Annual Design Automation Conference
Hardware Trojan horse detection using gate-level characterization
Proceedings of the 46th Annual Design Automation Conference
Information hiding for trusted system design
Proceedings of the 46th Annual Design Automation Conference
Physically restricted authentication with trusted hardware
Proceedings of the 2009 ACM workshop on Scalable trusted computing
MOLES: malicious off-chip leakage enabled by side-channels
Proceedings of the 2009 International Conference on Computer-Aided Design
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On Physical Obfuscation of Cryptographic Algorithms
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Lightweight mutual authentication and ownership transfer for RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Proceedings of the 47th Design Automation Conference
Low-power sub-threshold design of secure physical unclonable functions
Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design
PUF ROKs: generating read-once keys from physically unclonable functions
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Modeling attacks on physical unclonable functions
Proceedings of the 17th ACM conference on Computer and communications security
PEAR: a hardware based protocol authentication system
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Novel physical unclonable function with process and environmental variations
Proceedings of the Conference on Design, Automation and Test in Europe
Hardware trust implications of 3-D integration
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
Improving the quality of ring oscillator PUFs on FPGAs
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
Secure protocols for serverless remote product authentication
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
CUFFS: an instruction count based architectural framework for security of MPSoCs
Proceedings of the Conference on Design, Automation and Test in Europe
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Oblivious transfer based on physical unclonable functions
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
The glitch PUF: a new delay-PUF architecture exploiting glitch shapes
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Policy gradients for cryptanalysis
ICANN'10 Proceedings of the 20th international conference on Artificial neural networks: Part III
A PUF design for secure FPGA-based embedded systems
Proceedings of the 2010 Asia and South Pacific Design Automation Conference
Non-cryptographic authentication and identification in wireless networks
IEEE Wireless Communications
FPGA time-bounded unclonable authentication
IH'10 Proceedings of the 12th international conference on Information hiding
Enforcing physically restricted access control for remote data
Proceedings of the first ACM conference on Data and application security and privacy
SIMPL systems, or: can we design cryptographic hardware without secret key information?
SOFSEM'11 Proceedings of the 37th international conference on Current trends in theory and practice of computer science
System accuracy estimation of SRAM-based device authentication
Proceedings of the 16th Asia and South Pacific Design Automation Conference
PUF ROKs: a hardware approach to read-once keys
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Physically unclonable functions: manufacturing variability as an unclonable device identifier
Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI
Side-channel analysis of PUFs and fuzzy extractors
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
A practical device authentication scheme using SRAM PUFs
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Extracting device fingerprints from flash memory by exploiting physical variations
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Differential public physically unclonable functions: architecture and applications
Proceedings of the 48th Design Automation Conference
FPGA-Based true random number generation using circuit metastability with adaptive feedback control
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Lightweight and secure PUF key storage using limits of machine learning
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Recyclable PUFs: logically reconfigurable PUFs
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
MECCA: a robust low-overhead PUF using embedded memory array
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Location-based security for ID document and ID card enrollment stations
Proceedings of the 14th Communications and Networking Symposium
Semi-invasive EM attack on FPGA RO PUFs and countermeasures
WESS '11 Proceedings of the Workshop on Embedded Systems Security
An analysis of delay based PUF implementations on FPGA
ARC'10 Proceedings of the 6th international conference on Reconfigurable Computing: architectures, Tools and Applications
Security applications of diodes with unique current-voltage characteristics
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Towards electrical, integrated implementations of SIMPL systems
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
SIMPL systems as a keyless cryptographic and security primitive
Cryptography and Security
An attack on PUF-Based session key exchange and a hardware-based countermeasure: erasable PUFs
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
A novel RFID distance bounding protocol based on physically unclonable functions
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
A zero-overhead IC identification technique using clock sweeping and path delay analysis
Proceedings of the great lakes symposium on VLSI
Proceedings of the 49th Annual Design Automation Conference
Identification of recovered ICs using fingerprints from a light-weight on-chip sensor
Proceedings of the 49th Annual Design Automation Conference
International Journal of Reconfigurable Computing - Special issue on Selected Papers from the International Conference on Reconfigurable Computing and FPGAs (ReConFig'10)
Inspection resistant memory: architectural support for security from physical examination
Proceedings of the 39th Annual International Symposium on Computer Architecture
Evaluation of a PUF device authentication scheme on a discrete 0.13um SRAM
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Clockless physical unclonable functions
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Converse PUF-Based authentication
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
PUF-enhanced offline RFID security and privacy
Journal of Network and Computer Applications
Practical security analysis of PUF-based two-player protocols
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
PUFKY: a fully functional PUF-based cryptographic key generator
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Performance and security evaluation of AES s-box-based glitch PUFs on FPGAs
SPACE'12 Proceedings of the Second international conference on Security, Privacy, and Applied Cryptography Engineering
PHAP: Password based Hardware Authentication using PUFs
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
Resilient device authentication system (RDAS) through SIOMETRICS
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
Computers and Electrical Engineering
Document authentication using graphical codes: impacts of the channel model
Proceedings of the first ACM workshop on Information hiding and multimedia security
Design and implementation of a group-based RO PUF
Proceedings of the Conference on Design, Automation and Test in Europe
ClockPUF: physical unclonable functions based on clock networks
Proceedings of the Conference on Design, Automation and Test in Europe
Evaluation of delay PUFs on CMOS 65 nm technology: ASIC vs FPGA
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
RESP: a robust physical unclonable function retrofitted into embedded SRAM array
Proceedings of the 50th Annual Design Automation Conference
Improving PUF security with regression-based distiller
Proceedings of the 50th Annual Design Automation Conference
An FPGA chip identification generator using configurable ring oscillators
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
PUF-based secure test wrapper design for cryptographic SoC testing
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
Logic encryption: a fault analysis perspective
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
Characterization of the bistable ring PUF
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
Security analysis of integrated circuit camouflaging
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Bias-based modeling and entropy analysis of PUFs
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Hardware and embedded security in the context of internet of things
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
An accurate probabilistic reliability model for silicon PUFs
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
A high reliability PUF using hot carrier injection based response reinforcement
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Secure embedded system hardware design - A flexible security and trust enhanced approach
Computers and Electrical Engineering
Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead
Journal of Electronic Testing: Theory and Applications
A Comprehensive Framework for Counterfeit Defect Coverage Analysis and Detection Assessment
Journal of Electronic Testing: Theory and Applications
Hi-index | 0.00 |
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describe how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.