Sadeghi, Ahmad-Reza
Towards Hardware-Intrinsic Security
1. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions
Roel Maes, Ingrid Verbauwhede
2. Hardware Intrinsic Security from Physically Unclonable Functions
Helena Handschuh, Geert-Jan Schrijen, Pim Tuyls
3. From Statistics to Circuits: Foundations for Future Physical Unclonable Functions
Inyoung Kim, Abhranil Maiti, Leyla Nazhandali, Patrick Schaumont, Vignesh Vivekraja, Huaiye Zhang
4. Strong PUFs: Models, Constructions, and Security Proofs
Ulrich Rührmair, Heike Busch, Stefan Katzenbeisser
5. Leakage Resilient Cryptography in Practice
François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald
6. Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls
7. Hardware Trojan Horses
Mohammad Tehranipoor, Berk Sunar
8. Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning No Results
Yoo-Jin Baek, Vanessa Gratzer, Sung-Hyun Kim, David Naccache
9. License Distribution Protocols from Optical Media Fingerprints
Ghaith Hammouri, Aykutlu Dana, Berk Sunar
10. Anti-counterfeiting: Mixing the Physical and the Digital World
Darko Kirovski
11. Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware
Yong Ki Lee, Lejla Batina, Dave Singelee, Bart Preneel, Ingrid Verbauwhede
12. Contactless Security Token Enhanced Security by Using New Hardware Features in Cryptographic-Based Security Mechanisms
Markus Ullmann, Matthias Vögeler
13. Enhancing RFID Security and Privacy by Physically Unclonable Functions
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
14. Authentication of Processor Hardware Leveraging Performance Limits in Detailed Simulations and Emulations
Daniel Y. Deng, Andrew H. Chan, G. Edward Suh
15. Signal Authentication in Trusted Satellite Navigation Receivers
Markus G. Kuhn
16. On the Limits of Hypervisor- and Virtual Machine Monitor-Based Isolation
Loic Duflot, Olivier Grumelard, Olivier Levillain, Benjamin Morin
17. Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version)*
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
18. Towards Reliable Remote Healthcare Applications Using Combined Fuzzy Extraction
Jorge Guajardo, Muhammad Asim, Milan Petković
Keywords: Computer Science, Data Structures, Cryptology and Information Theory, Computer Hardware, Electrical Engineering
- Author(s)
- Sadeghi, Ahmad-Reza
- Naccache, David
- Publisher
- Springer
- Publication year
- 2010
- Language
- en
- Edition
- 1
- Series
- Information Security and Cryptography
- Page amount
- 16 pages
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9783642144523