A Digital 1.6 pJ/bit Chip Identification Circuit Using Process Variations
|
journal
|
January 2008 |
A technique to build a secret key in integrated circuits for identification and authentication applications
|
conference
|
January 2004 |
Energy Scalable Universal Hashing
|
journal
|
December 2005 |
Extended abstract: The butterfly PUF protecting IP on every FPGA
|
conference
|
June 2008 |
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
|
journal
|
January 2008 |
LFSR-based Hashing and Authentication
|
conference
|
January 1994 |
Physical unclonable functions for device authentication and secret key generation
|
conference
|
January 2007 |
Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection
|
conference
|
August 2007 |
Silicon physical random functions
|
conference
|
January 2002 |
A physical unclonable function defined using power distribution system equivalent resistance variations
|
conference
|
January 2009 |
IC identification circuit using device mismatch
|
conference
|
January 2000 |
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
|
conference
|
January 2010 |
An artificial fingerprint device (AFD): a study of identification number applications utilizing characteristics variation of polycrystalline silicon TFTs
|
journal
|
June 2003 |
Comb Capacitor Structures for On-Chip Physical Uncloneable Function
|
journal
|
February 2009 |
LISA: Maximizing RO PUF's secret extraction
- Yin, Chi-En; Qu, Gang
-
2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
https://doi.org/10.1109/HST.2010.5513105
|
conference
|
June 2010 |
Circuit having increased noise immunity and capable of generating a reference voltage or terminating a transmission line
|
patent
|
October 2002 |
Data processing systems and methods with enhanced bios functionality
|
patent
|
May 2008 |
Self-timed thermally-aware circuits and methods of use thereof
|
patent
|
August 2008 |
Volatile device keys and applications thereof
|
patent
|
July 2009 |
System and method of reliable forward secret key sharing with physical random functions
|
patent
|
January 2010 |
Reliable generation of a device-specific value
|
patent
|
March 2010 |
Securely field configurable device
|
patent
|
April 2010 |
Integrated circuit that uses a dynamic characteristic of the circuit
|
patent
|
July 2010 |
Data protection and cryptographic functions using a device-specific value
|
patent
|
October 2010 |
Volatile device keys and applications thereof
|
patent
|
November 2010 |
Authentication of integrated circuits
|
patent
|
November 2010 |
Reception comparator for signal modulation upon a supply line
|
patent
|
April 2011 |
Method and system for authentication of a physical object
|
patent
|
October 2011 |
Hardware device to physical structure binding and authentication
|
patent
|
August 2013 |
Physically unclonable function implemented through threshold voltage comparison
|
patent
|
December 2013 |
Authentication with physical unclonable functions
|
patent
|
July 2014 |
Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting
|
patent
|
September 2014 |
Method for protecting information carrier comprising an integrated circuit
|
patent-application
|
February 2007 |
Controlling Access to Device-Specific Information
|
patent-application
|
August 2007 |
Sharing a secret by using random function
|
patent-application
|
March 2008 |
Authentication with Physical Unclonable Functions
|
patent-application
|
March 2009 |
Integrated Circuit and Method for Preventing an Unauthorized Access to a Digital Value
|
patent-application
|
April 2010 |
Physically Unclonable Function Implemented Through Threshold Voltage Comparison
|
patent-application
|
December 2011 |