Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
Open Access
- 4 August 2016
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- Fault Injection Modeling Attacks on 65 nm Arbiter and RO Sum PUFs via Environmental ChangesIEEE Transactions on Circuits and Systems I: Regular Papers, 2014
- An Accurate Probabilistic Reliability Model for Silicon PUFsLecture Notes in Computer Science, 2013
- PUFKY: A Fully Functional PUF-Based Cryptographic Key GeneratorLecture Notes in Computer Science, 2012
- Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDsLecture Notes in Computer Science, 2012
- Leftover Hash Lemma, RevisitedLecture Notes in Computer Science, 2011
- Efficient Helper Data Key Extractor on FPGAsLecture Notes in Computer Science, 2008
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy DataSIAM Journal on Computing, 2008
- Read-Proof Hardware from Protective CoatingsLecture Notes in Computer Science, 2006
- A Pseudorandom Generator from any One-way FunctionSIAM Journal on Computing, 1999
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979