Converse PUF-Based Authentication
- 1 January 2012
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 23 references indexed in Scilit:
- PUF-based secure test wrapper design for cryptographic SoC testingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Logically reconfigurable PUFsPublished by Association for Computing Machinery (ACM) ,2011
- On Physical Obfuscation of Cryptographic AlgorithmsLecture Notes in Computer Science, 2009
- Memory Leakage-Resilient Encryption Based on Physically Unclonable FunctionsLecture Notes in Computer Science, 2009
- Brand and IP protection with physical unclonable functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Efficient Helper Data Key Extractor on FPGAsLecture Notes in Computer Science, 2007
- FPGA Intrinsic PUFs and Their Use for IP ProtectionLecture Notes in Computer Science, 2007
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy DataLecture Notes in Computer Science, 2004
- Silicon physical random functionsPublished by Association for Computing Machinery (ACM) ,2002
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993