11 M van Dijk System and Method of Reliable Forward Secret Key Sharing With

11 m van dijk system and method of reliable forward

This preview shows page 15 - 16 out of 16 pages.

[11] M. van Dijk, “System and Method of Reliable Forward Secret Key Sharing With Physical Random Functions,” U.S. Patent 7,653,197, Oct. 2004. [12] M. van Dijk and U. Rührmair:, Physical unclonable functions in cryp- tographic protocols: Security proofs and impossibility results, Cryp- tology ePrint Archive, 2012:228, 2012. [13] Y. Dodis, R. Ostrovsky, L. Reyzin, L. , and A. Smith:, “Fuzzy ex- tractors: How to generate strong keys from biometrics and other noisy data,” SIAM J. Comput. , vol. 38, no. 1, pp. 97–139, 2008. [14] B. L. P. Gassend, “Physical Random Functions,” M.Sc. Thesis, MIT, Cambridge, MA, USA, 2003. [15] B. Gassend, D. Clarke, M. Van Dijk, and S. Devadas, “Silicon physical random functions,” in Proc. ACM CCS , 2002, pp. 148–160. [16] B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, “Controlled phys- ical random functions,” in Proc. ACSAC 2002 , pp. 149–160. [17] B. Gassend, D. Lim, D. Clarke, M. Van Dijk, and S. Devadas, “Iden- ti fi cation and authentication of integrated circuits,” Concurrency and Computation: Practice & Experience , vol. 16, no. 11, pp. 1077–1098, 2004. [18] J. Guajardo, S. Kumar, G. J. Schrijen, and P. Tuyls, “FPGA intrinsic PUFs and their use for IP protection,” in Proc. CHES 2007 , pp. 63–80. [19] C. Helfmeier, C. Boit, D. Nedospasov, and J. P. Seifert, “Cloning phys- ically unclonable functions,” in Proc. HOST , 2013, pp. 1–6.
Image of page 15
RÜHRMAIR et al. : PUF MODELING ATTACKS ON SIMULATED AND SILICON DATA 1891 [20] D. E. Holcomb, W. P. Burleson, and K. Fu, “Initial sram state as a fi ngerprint and source of true random numbers for RFID tags,” in Proc. Conf. RFID Security , 2007. [21] C. Jaeger, M. Algasinger, U. Rührmair, G. Csaba, and M. Stutzmann, “Random p-n-junctions for physical cryptography,” Appl. Phys. Lett. , vol. 96, p. 172103, 2010. [22] S. S. Kumar, J. Guajardo, R. Maes, G. J. Schrijen, and P. Tuyls, “Ex- tended abstract: The butter fl y PUF protecting IP on every FPGA,” in Proc. HOST , 2008, pp. 67–70. [23] J. W. Lee, D. Lim, B. Gassend, G. E. Suh, M. Van Dijk, and S. Devadas, “A technique to build a secret key in integrated circuits for identi fi - cation and authentication applications,” in Proc. IEEE VLSI Circuits Symp. , 2004, pp. 176–179. [24] D. Lim, “Extracting Secret Keys from Integrated Circuits,” M.Sc. thesis, MIT, Cambridge, MA, USA, 2004. [25] D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. Van Dijk, and S. De- vadas, “Extracting secret keys from integrated circuits,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst. , vol. 13, no. 10, pp. 1200–1205, Oct. 2005. [26] M. Majzoobi, F. Koushanfar, and M. Potkonjak, “Testing techniques for hardware security,” in Proc. Int. Test Conf. (ITC) , 2008, pp. 1–10. [27] M. Majzoobi, F. Koushanfar, and M. Potkonjak, “Lightweight secure PUFs,” in Proc. IEEE/ACM Int. Conf. Computer-Aided Design , 2008, pp. 670–673. [28] M. Majzoobi, F. Koushanfar, and M. Potkonjak, “Techniques for de- sign and implementation of secure recon fi gurable PUFs,” ACM Trans. Recon fi g. Technol. Syst. , vol. 2, no. 1, 2009. [29] M. Majzoobi, F. Koushanfar, and S. Devadas, “FPGA PUF using pro- grammable delay lines,” in Proc. IEEE Workshop Information Foren- sics and Security (WIFS) , 2010, pp. 1–6. [30] M. Majzoobi, M. Rostami, F. Koushanfar, D. S. Wallach, and S. De- vadas, “Slender PUF protocol: A lightweight, robust, and secure au- thentication by substring matching,” in Proc. IEEE S&P Workshops , 2012, pp. 33–44.
Image of page 16

You've reached the end of your free preview.

Want to read all 16 pages?

  • Summer '15

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask ( soon) You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors