Proceedings of the 9th ACM Conference on Computer and Communications Security 2002
DOI: 10.1145/586110.586132
|View full text |Cite
|
Sign up to set email alerts
|

Silicon physical random functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
480
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 1,312 publications
(525 citation statements)
references
References 11 publications
1
480
0
Order By: Relevance
“…By exploiting statistical variations in the delays of devices (gates and wires) within the IC, we can create a manufacturer resistant PUF [GCvDD02]. Manufactured IC's, from either the same lot or wafer have inherent delay variations.…”
Section: Statistical Variation Of Delaymentioning
confidence: 99%
See 1 more Smart Citation
“…By exploiting statistical variations in the delays of devices (gates and wires) within the IC, we can create a manufacturer resistant PUF [GCvDD02]. Manufactured IC's, from either the same lot or wafer have inherent delay variations.…”
Section: Statistical Variation Of Delaymentioning
confidence: 99%
“…PUFs can be implemented in different ways and can be used in authenticated identification applications [GCvDD02,Rav01]. In this paper, we introduce Controlled Physical Random Functions (CPUFs) which are PUFs that can only be accessed via an algorithm that is physically bound to the PUF in an inseparable way.…”
Section: Introductionmentioning
confidence: 99%
“…Another potential protection strategy is to utilise Physical Unclonable Functions (PUFs) [116] to provide hardware validation. It is di cult to nd a single and consistent denition of PUF in the literature [117].…”
Section: Trusted Environment and Execution Managermentioning
confidence: 99%
“…It is di cult to nd a single and consistent denition of PUF in the literature [117]. However, a property description de nition of the PUF is provided by Gassend et al in [116]. Usual applications of the PUF described in the literature are in anti-counterfeiting [118], Intellectual Property protection [119] [121], tamper-evident hardware [122], hardware based cryptography [60,123] [125] and secure/trusted processors [126].…”
Section: Trusted Environment and Execution Managermentioning
confidence: 99%
See 1 more Smart Citation