Physical unclonable function

Results: 48



#Item
21Power and Timing Side Channels for PUFs and their Efficient Exploitation Ulrich R¨uhrmair, Xiaolin Xu, Jan S¨olter, Ahmed Mahmoud, Farinaz Koushanfar, Wayne Burleson Abstract—We discuss the first power and timing sid

Power and Timing Side Channels for PUFs and their Efficient Exploitation Ulrich R¨uhrmair, Xiaolin Xu, Jan S¨olter, Ahmed Mahmoud, Farinaz Koushanfar, Wayne Burleson Abstract—We discuss the first power and timing sid

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-20 06:36:55
22A Comparative Analysis of Delay Based PUF Implementations on FPGA Sergey Morozov, Abhranil Maiti, Patrick Schaumont, Virginia Polytechnic Institute and State University {morozovs, abhranil, schaum}@vt.edu

A Comparative Analysis of Delay Based PUF Implementations on FPGA Sergey Morozov, Abhranil Maiti, Patrick Schaumont, Virginia Polytechnic Institute and State University {morozovs, abhranil, schaum}@vt.edu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-19 15:05:40
23Security Analysis of a PUF based RFID Authentication Protocol Masoumeh Safkhani1 , Nasour Bagheri2 and Majid Naderi1 1  2

Security Analysis of a PUF based RFID Authentication Protocol Masoumeh Safkhani1 , Nasour Bagheri2 and Majid Naderi1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-09 03:59:55
24Foundations of Reconfigurable PUFs Jonas Schneider and Dominique Schr¨oder Saarland University Abstract. A Physically Unclonable Function (PUF) can be seen as a source of randomness that can be challenged with a stimulu

Foundations of Reconfigurable PUFs Jonas Schneider and Dominique Schr¨oder Saarland University Abstract. A Physically Unclonable Function (PUF) can be seen as a source of randomness that can be challenged with a stimulu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-02 12:17:10
251  Hardware/Software Security Support R. R. Brooks, Associate Professor S. T. Sander, Assistant professor Holcombe Department of Electrical and Computer Engineering

1 Hardware/Software Security Support R. R. Brooks, Associate Professor S. T. Sander, Assistant professor Holcombe Department of Electrical and Computer Engineering

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-09 15:36:30
26Anti-counterfeit polymers work like fingerprints

Anti-counterfeit polymers work like fingerprints

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-04-17 05:31:11
27Quantum physics can fight fraud by making card verification unspoofable

Quantum physics can fight fraud by making card verification unspoofable

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-04-16 08:09:40
28Letter  QUANTUM-SECURE AUTHENTICATION OF A PHYSICAL UNCLONABLE KEY SEBASTIANUS A. GOORDEN,1 MARCEL HORSTMANN,1,2 ALLARD P. MOSK,1 BORIS ŠKORIĆ,3 AND PEPIJN W.H. PINKSE1,*

Letter QUANTUM-SECURE AUTHENTICATION OF A PHYSICAL UNCLONABLE KEY SEBASTIANUS A. GOORDEN,1 MARCEL HORSTMANN,1,2 ALLARD P. MOSK,1 BORIS ŠKORIĆ,3 AND PEPIJN W.H. PINKSE1,*

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2014-12-18 09:21:18
29S ERCULATE 2 The Security & Software Engineering Research Center Newsletter	  IN THIS ISSUE...

S ERCULATE 2 The Security & Software Engineering Research Center Newsletter IN THIS ISSUE...

Add to Reading List

Source URL: www.serc.net

Language: English - Date: 2015-01-09 04:12:07
30Modeling Attacks on Physical Unclonable Functions Ulrich Rührmair Frank Sehnke  Jan Sölter

Modeling Attacks on Physical Unclonable Functions Ulrich Rührmair Frank Sehnke Jan Sölter

Add to Reading List

Source URL: www6.in.tum.de

Language: English - Date: 2013-05-15 08:23:46