2006
DOI: 10.1007/11894063_29
|View full text |Cite
|
Sign up to set email alerts
|

Read-Proof Hardware from Protective Coatings

Abstract: Abstract. In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient because attackers have access to many physical means that enable them to derive information on the secret keys. In order to limit the attacker's ability to read out secret information, the concept of Algorithmic Tamper Proof (ATP) security is needed as put forth by Gennaro, Lysyanskaya, Malkin, Micali and Rabin. An essential co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
202
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 303 publications
(202 citation statements)
references
References 15 publications
0
202
0
Order By: Relevance
“…Each cell produces a single bit, or occasionally a few bits. This includes memory-based designs, such as the SRAM PUF [16], as well as the coating PUF [25] and a subset of the large number of ring oscillator-based designs, e.g., [29]. The most prominent entropy-degrading effects for such PUFs are bias and spatial correlations.…”
Section: Physically Unclonable Functionsmentioning
confidence: 99%
“…Each cell produces a single bit, or occasionally a few bits. This includes memory-based designs, such as the SRAM PUF [16], as well as the coating PUF [25] and a subset of the large number of ring oscillator-based designs, e.g., [29]. The most prominent entropy-degrading effects for such PUFs are bias and spatial correlations.…”
Section: Physically Unclonable Functionsmentioning
confidence: 99%
“…The term Physically Unclonable Function was introduced by Pappu [4,5]. Since then, many di erent physical objects have been proposed as PUF candidates, including Optical PUF [4,5], Coating PUF [20], Silicon PUF [21 23], SRAM PUF [24], Paper PUF [10, 12 14], Phosphor PUF [3,15], Laser-Written PUF [16,25], etc.…”
Section: Previous Workmentioning
confidence: 99%
“…However, a property description de nition of the PUF is provided by Gassend et al in [116]. Usual applications of the PUF described in the literature are in anti-counterfeiting [118], Intellectual Property protection [119] [121], tamper-evident hardware [122], hardware based cryptography [60,123] [125] and secure/trusted processors [126].…”
Section: Trusted Environment and Execution Managermentioning
confidence: 99%