Physical unclonable function

Results: 48



#Item
31Policy Gradients for Cryptanalysis Frank Sehnke1 , Christian Osendorfer1, Jan S¨ olter2 , 3,4 J¨ urgen Schmidhuber , and Ulrich R¨

Policy Gradients for Cryptanalysis Frank Sehnke1 , Christian Osendorfer1, Jan S¨ olter2 , 3,4 J¨ urgen Schmidhuber , and Ulrich R¨

Add to Reading List

Source URL: www6.in.tum.de

Language: English - Date: 2013-05-15 08:23:49
32INVITED PAPER Mobile Trusted Computing This paper surveys the trusted computing features in mobile computing platforms. By N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas,

INVITED PAPER Mobile Trusted Computing This paper surveys the trusted computing features in mobile computing platforms. By N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas,

Add to Reading List

Source URL: rebootingcomputing.ieee.org

Language: English - Date: 2014-08-25 09:54:55
33NIST KMW[removed]Secure Key Storage and True RNG (Rene Struik, September 11, 2012)

NIST KMW[removed]Secure Key Storage and True RNG (Rene Struik, September 11, 2012)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:10:44
34Restricted Authentication and Encryption for Cyber-physical Systems Michael Kirkpatrick Department of Computer Science Purdue University [removed]

Restricted Authentication and Encryption for Cyber-physical Systems Michael Kirkpatrick Department of Computer Science Purdue University [removed]

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2010-02-11 15:47:46
35Secure Circuits and Embedded Systems Research

Secure Circuits and Embedded Systems Research

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:18:44
36Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions G. Edward Suh, Charles W. O’Donnell, Ishan Sachdev, and Srinivas Devadas Computer Science and Artificial Intelligence

Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions G. Edward Suh, Charles W. O’Donnell, Ishan Sachdev, and Srinivas Devadas Computer Science and Artificial Intelligence

Add to Reading List

Source URL: csg.csail.mit.edu

Language: English - Date: 2005-04-24 19:19:10
37Restricted Authentication and Encryption for Cyber-physical Systems Michael Kirkpatrick Department of Computer Science Purdue University [removed]

Restricted Authentication and Encryption for Cyber-physical Systems Michael Kirkpatrick Department of Computer Science Purdue University [removed]

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2010-02-11 15:47:46
38Virtual Proofs of Reality Ulrich R¨uhrmair [removed] Abstract—In this paper, we discuss the question how physical statements can be proven remotely over digital communication

Virtual Proofs of Reality Ulrich R¨uhrmair [removed] Abstract—In this paper, we discuss the question how physical statements can be proven remotely over digital communication

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-06-06 08:08:31
39Stability Analysis of a Physical Unclonable Function based on Metal Resistance Variations J. Ju, R. Chakraborty*, C. Lamech* and J. Plusquellic

Stability Analysis of a Physical Unclonable Function based on Metal Resistance Variations J. Ju, R. Chakraborty*, C. Lamech* and J. Plusquellic

Add to Reading List

Source URL: www.ece.unm.edu

Language: English - Date: 2013-04-29 13:36:52
40A Physical Unclonable Function Defined Using Power Distribution System Equivalent Resistance Variations Ryan Helinski

A Physical Unclonable Function Defined Using Power Distribution System Equivalent Resistance Variations Ryan Helinski

Add to Reading List

Source URL: www.ece.unm.edu

Language: English - Date: 2010-08-13 20:39:38