Back to Results
First PageMeta Content
Data / Information / Communications protocol / Challenge-response authentication / Cryptography / Physical Unclonable Function / Randomness


2013 IEEE Symposium on Security and Privacy PUFs in Security Protocols: Attack Models and Security Evaluations Ulrich R¨uhrmair Computer Science Department Technische Universit¨at M¨unchen
Add to Reading List

Document Date: 2013-04-05 19:56:34


Open Document

File Size: 240,56 KB

Share Result on Facebook

City

A PUF / /

Country

Germany / /

Currency

USD / /

/

Facility

ATTACK M ODELS FOR S TRONG PUF P ROTOCOLS Building / /

IndustryTerm

hardware systems / minuscule manufacturing irregularities / given protocol / wireless triggering / et al. give several protocols / malicious hardware / cryptographic protocols / simulation algorithm / identification protocols / above protocols / electronic devices / classical cryptographic protocols / bank card / software attacks / security protocols / session key exchange protocol / /

Organization

MIT / /

Person

Ron Rivest / Claire / Bob / Alice / /

Position

challenge logger / author / re-use model / the PAM / logger / /

ProgrammingLanguage

R / /

ProvinceOrState

California / Massachusetts / /

Technology

simulation algorithm / typical two-party protocol / three above protocols / early KE-protocol / key exchange protocol / classical cryptographic protocols / 287 known PUF-protocols / The protocol / analyzed PUF-protocols / PUF protocol / smart card / cryptographic PUF protocols / attacked protocol / two protocols / secret key / considered protocols / BC protocol / recent KE-protocol / early OT-protocol / recent OT protocol / PUF protocols / PUF-based security protocols / existing protocols / identification protocols / cryptography / laser / The KE protocol / OT protocol / PUF-based session key exchange protocol / given protocol / KE protocol / simulation / same protocol / two protocol / evaluated protocols / recent BC-protocol / OT protocols / /

SocialTag