2013 Fourth International Conference on Emerging Security Technologies 2013
DOI: 10.1109/est.2013.37
|View full text |Cite
|
Sign up to set email alerts
|

Construction of Software-Based Digital Physical Clone Resistant Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…The DBF easily passes several security and randomness tests, but is not unclonable and cannot be integrated with regular digital logic without significant time overhead. In the second effort, Fyrbiak et al proposed the creation of software security primitives using hardware random generators [19]. Hardware-software security primitives require relatively long execution times and depend on unspecified reproducible random generators.…”
Section: Related Workmentioning
confidence: 99%
“…The DBF easily passes several security and randomness tests, but is not unclonable and cannot be integrated with regular digital logic without significant time overhead. In the second effort, Fyrbiak et al proposed the creation of software security primitives using hardware random generators [19]. Hardware-software security primitives require relatively long execution times and depend on unspecified reproducible random generators.…”
Section: Related Workmentioning
confidence: 99%