31 E Öztürk G Hammouri and B Sunar Towards robust low cost au thentication for

31 e öztürk g hammouri and b sunar towards robust

This preview shows page 16 out of 16 pages.

[31] E. Öztürk, G. Hammouri, and B. Sunar, “Towards robust low cost au- thentication for pervasive devices,” in Proc. IEEE PerCom , 2008, pp. 170–178. [32] C. H. Papadimitriou , Computational Complexity . Hoboken, NJ, USA: Wiley, 2003. [33] R. Pappu, “Physical One-Way Functions,” Ph.D. thesis, MIT, Cam- bridge, MA, USA, 2001. [34] R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, “Physical one-way functions,” Science , vol. 297, no. 5589, pp. 2026–2030, 2002. [35] M. Riedmiller and H. Braun, “A direct adaptive method for faster back- propagation learning: The RPROP algorithm,” in Proc. IEEE Int. Conf. Neural Networks , 1993, pp. 586–591. [36] U. Rührmair, “Oblivious transfer based on physical unclonable func- tions (extended abstract),” in Proc. TRUST 2010 , 2010, vol. 6101, pp. 430–440, LNCS, Springer. [37] U. Rührmair, H. Busch, and S. Katzenbeisser, “Strong PUFs: Models, constructions and security proofs,” in Towards Hardware Intrinsic Se- curity: Foundation and Practice , A.-R. Sadeghi and P. Tuyls, Eds. New York, NY, USA: Springer, 2010. [38] U. Rührmair, S. Devadas, and F. Koushanfar, “Security based on phys- ical unclonability and disorder,” in Introduction to Hardware Security and Trust , M. Tehranipoor and C. Wang, Eds. New York, NY, USA: Springer, 2011. [39] U. Rührmair, C. Jaeger, M. Bator, M. Stutzmann, P. Lugli, and G. Csaba, “Applications of high-capacity crossbar memories in cryptog- raphy,” IEEE Trans. Nanotechnol. , vol. 10, no. 3, pp. 489–498, May 2011. [40] U. Rührmair, C. Jaeger, C. Hilgers, M. Algasinger, G. Csaba, and M. Stutzmann, “Security applications of diodes with unique cur- rent-voltage characteristics,” Financial Cryptography and Data Security (FC) , pp. 328–335, 2010. [41] U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, and J. Schmid- huber, “Modeling attacks on physical unclonable functions,” in Proc. ACM CCS , 2010, pp. 237–249. [42] U. Rührmair, J. Sölter, and F. Sehnke, On the Foundations of Phys- ical Unclonable Functions, Cryptology ePrint Archive, Rep. 2009/277, 2009. [43] T. Schaul, J. Bayer, D. Wierstra, Y. Sun, M. Felder, F. Sehnke, T. Rück- stieß, and J. Schmidhuber, “PyBrain,” J. Mach. Learning Res. , vol. 1, pp. 999–1000, 2010. [44] H. P. P. Schwefel , Evolution and Optimum Seeking: The Sixth Gener- ation . Hoboken, NJ, USA: Wiley, 1993. [45] J. Sölter, “Cryptanalysis of Electrical PUFs via Machine Learning Al- gorithms,” M.Sc. thesis, Technische Universität München, München, 2009. [46] G. E. Suh and S. Devadas, Physical unclonable functions for device authentication and secret key generation, DAC, 2007, pp. 9–14. [47] P. Tuyls, G. J. Schrijen, B. Škori ć , J. van Geloven, N. Verhaegh, and R. Wolters, “Read-proof hardware from protective coatings,,” in CHES , 2006, pp. 369–383. [48] P. Tuyls and B. Skoric, “Strong Authentication with PUFs,” in Security, Privacy and Trust in Modern Data Management , M. Petkovic and W. Jonker, Eds. New York, NY, USA: Springer, 2007. [49] M.-D. Yu, D. M’Raïhi, R. Sowell, and S. Devadas, “Lightweight and secure PUF key storage using limits of machine learning,” in Proc.
Image of page 16

You've reached the end of your free preview.

Want to read all 16 pages?

  • Summer '15

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask You can ask ( soon) You can ask (will expire )
Answers in as fast as 15 minutes