On Physical Obfuscation of Cryptographic Algorithms
- 1 January 2009
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 21 references indexed in Scilit:
- Trusted-HB: A Low-Cost Version of HB$^+$ Secure Against Man-in-the-Middle AttacksIEEE Transactions on Information Theory, 2008
- : Increasing the Security and Efficiency ofPublished by Springer Science and Business Media LLC ,2008
- Unclonable Lightweight Authentication SchemeLecture Notes in Computer Science, 2008
- Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable FunctionLecture Notes in Computer Science, 2008
- PUF-HB: A Tamper-Resilient HB Based Authentication ProtocolLecture Notes in Computer Science, 2008
- FPGA Intrinsic PUFs and Their Use for IP ProtectionLecture Notes in Computer Science, 2007
- Provably Secure Masking of AESLecture Notes in Computer Science, 2004
- Secure Human Identification ProtocolsLecture Notes in Computer Science, 2001
- The Shrinking GeneratorPublished by Springer Science and Business Media LLC ,2001
- Efficient Structures for Geometric Data ManagementPublished by Springer Science and Business Media LLC ,1988