default search action
Towards Hardware-Intrinsic Security 2010
- Ahmad-Reza Sadeghi, David Naccache:
Towards Hardware-Intrinsic Security - Foundations and Practice. Information Security and Cryptography, Springer 2010, ISBN 978-3-642-14451-6
Physically Unclonable Functions (PUFs)
- Roel Maes, Ingrid Verbauwhede:
Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions. 3-37 - Helena Handschuh, Geert Jan Schrijen, Pim Tuyls:
Hardware Intrinsic Security from Physically Unclonable Functions. 39-53 - Inyoung Kim, Abhranil Maiti, Leyla Nazhandali, Patrick Schaumont, Vignesh Vivekraja, Huaiye Zhang:
From Statistics to Circuits: Foundations for Future Physical Unclonable Functions. 55-78 - Ulrich Rührmair, Heike Busch, Stefan Katzenbeisser:
Strong PUFs: Models, Constructions, and Security Proofs. 79-96
Hardware-based Cryptography
- François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald:
Leakage Resilient Cryptography in Practice. 99-134 - Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls:
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. 135-164
Hardware Attacks
- Mohammad Tehranipoor, Berk Sunar:
Hardware Trojan Horses. 167-187 - Yoo-Jin Baek, Vanessa Gratzer, Sung-Hyun Kim, David Naccache:
Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning No Results. 189-197
Hardware-based Policy Enforcement
- Ghaith Hammouri, Aykutlu Dana, Berk Sunar:
License Distribution Protocols from Optical Media Fingerprints. 201-222 - Darko Kirovski:
Anti-counterfeiting: Mixing the Physical and the Digital World. 223-233
Hardware-Security in Contactless Tokens
- Yong Ki Lee, Lejla Batina, Dave Singelée, Bart Preneel, Ingrid Verbauwhede:
Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware. 237-257 - Markus Ullmann, Matthias Vögeler:
Contactless Security Token Enhanced Security by Using New Hardware Features in Cryptographic-Based Security Mechanisms. 259-279 - Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann:
Enhancing RFID Security and Privacy by Physically Unclonable Functions. 281-305
Hardware-based Security Architectures and Applications
- Daniel Y. Deng, Andrew H. Chan, G. Edward Suh:
Authentication of Processor Hardware Leveraging Performance Limits in Detailed Simulations and Emulations. 309-329 - Markus G. Kuhn:
Signal Authentication in Trusted Satellite Navigation Receivers. 331-348 - Loïc Duflot, Olivier Grumelard, Olivier Levillain, Benjamin Morin:
On the Limits of Hypervisor- and Virtual Machine Monitor-Based Isolation. 349-366 - Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider:
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version). 367-386 - Jorge Guajardo, Muhammad Asim, Milan Petkovic:
Towards Reliable Remote Healthcare Applications Using Combined Fuzzy Extraction. 387-407
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.