Physical unclonable function

Results: 48



#Item
1Computer security / Cryptography / Computing / Security / Trusted Platform Module / Data in use / Embedded system / Physical unclonable function / Trusted Computing / Software / Operating system / Key management

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:07:52
2Public-key cryptography / Notary / Elliptic curve cryptography / Randomness / Finite fields / Radio-frequency identification / Authentication protocol / Physical unclonable function / Authentication / Digital signature / Quantum readout of PUFs / Types of physical unclonable function

Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-08-29 03:45:16
3Randomness / Formal sciences / Physical unclonable function / Information theory

ˇ Publications by Boris Skori´ c ˇ [1] B. Skori´ c. Unclonable encryption revisited: 4x2=8, 2015. https://eprint.iacr.org.

Add to Reading List

Source URL: security1.win.tue.nl

Language: English - Date: 2016-01-03 03:15:37
4Data / Information / Communications protocol / Challenge-response authentication / Cryptography / Physical Unclonable Function / Randomness

2013 IEEE Symposium on Security and Privacy PUFs in Security Protocols: Attack Models and Security Evaluations Ulrich R¨uhrmair Computer Science Department Technische Universit¨at M¨unchen

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2013-04-05 19:56:34
5Computer security / Hardware Trojan / Field-programmable gate array / Physical Unclonable Function / Cyberwarfare / Security / Fault injection / Software testing

www.cost.eu/ict COST Action no. IC1204 2012⏐2016

Add to Reading List

Source URL: w3.cost.eu

Language: English - Date: 2013-05-30 08:33:11
6Technology / Surveillance / Impinj / MIFARE / Physical Unclonable Function / Cloning / Bulk reading / RuBee / Radio-frequency identification / Automatic identification and data capture / Human–computer interaction

Securing RFID systems by detecting tag cloning Mikko Lehtonen1 , Daniel Ostojic2 , Alexander Ilic1 and Florian Michahelles1 1 2

Add to Reading List

Source URL: www.im.ethz.ch

Language: English - Date: 2009-06-23 03:52:17
7Physical Unclonable Function / Randomness / Analysis of algorithms / Challenge-response authentication / IP / Control flow graph / PUF / Pseudorandomness / Copy protection / Cryptography / Applied mathematics / Theoretical computer science

A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2012-06-05 18:18:00
8Physical Unclonable Function / Randomness / Elliptic curve cryptography / Side channel attack / PUF / LEX / Hardware Trojan / Digital rights management / Joint Test Action Group / Cryptography / Advanced Encryption Standard / Trojan horses

HOST-2010 3rd Annual IEEE International Symposium on Hardware-Oriented Security and Trust June 13-14, 2010 – Anaheim Convention Center, Anaheim, CA Sunday, June 13th

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2010-10-16 10:23:01
9Security / Hardware Trojan / Physical Unclonable Function / Side channel attack / Computer security / Power analysis / Threat / Cryptography / Cyberwarfare / Computer network security

ODETTE: A Non-Scan Design-for-Test Methodology for Trojan Detection in ICs M. Banga and M. Hsiao (Virginia Tech) 11:45 - 1:00: Lunch 1:00 - 2:00: Poster Session Session Chair: Patrick Schaumont

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2011-05-27 10:02:27
10Computer network security / Cyberwarfare / Social engineering / Spyware / Physical Unclonable Function / Computer security / Field-programmable gate array / Security / Trojan horses / Hardware Trojan

HOST2nd IEEE International Workshop on Hardware-Oriented Security and Trust July 27, 2009, Moscone Center, Room 304, San Francisco, CA

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2009-10-29 22:42:52
UPDATE