Sadeghi, Ahmad-Reza

Towards Hardware-Intrinsic Security

Sadeghi, Ahmad-Reza - Towards Hardware-Intrinsic Security, ebook


Ebook, PDF with Adobe DRM
ISBN: 9783642144523
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions
Roel Maes, Ingrid Verbauwhede

2. Hardware Intrinsic Security from Physically Unclonable Functions
Helena Handschuh, Geert-Jan Schrijen, Pim Tuyls

3. From Statistics to Circuits: Foundations for Future Physical Unclonable Functions
Inyoung Kim, Abhranil Maiti, Leyla Nazhandali, Patrick Schaumont, Vignesh Vivekraja, Huaiye Zhang

4. Strong PUFs: Models, Constructions, and Security Proofs
Ulrich Rührmair, Heike Busch, Stefan Katzenbeisser

5. Leakage Resilient Cryptography in Practice
François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald

6. Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls

7. Hardware Trojan Horses
Mohammad Tehranipoor, Berk Sunar

8. Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning No Results
Yoo-Jin Baek, Vanessa Gratzer, Sung-Hyun Kim, David Naccache

9. License Distribution Protocols from Optical Media Fingerprints
Ghaith Hammouri, Aykutlu Dana, Berk Sunar

10. Anti-counterfeiting: Mixing the Physical and the Digital World
Darko Kirovski

11. Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware
Yong Ki Lee, Lejla Batina, Dave Singelee, Bart Preneel, Ingrid Verbauwhede

12. Contactless Security Token Enhanced Security by Using New Hardware Features in Cryptographic-Based Security Mechanisms
Markus Ullmann, Matthias Vögeler

13. Enhancing RFID Security and Privacy by Physically Unclonable Functions
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann

14. Authentication of Processor Hardware Leveraging Performance Limits in Detailed Simulations and Emulations
Daniel Y. Deng, Andrew H. Chan, G. Edward Suh

15. Signal Authentication in Trusted Satellite Navigation Receivers
Markus G. Kuhn

16. On the Limits of Hypervisor- and Virtual Machine Monitor-Based Isolation
Loic Duflot, Olivier Grumelard, Olivier Levillain, Benjamin Morin

17. Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version)*
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider

18. Towards Reliable Remote Healthcare Applications Using Combined Fuzzy Extraction
Jorge Guajardo, Muhammad Asim, Milan Petković

Keywords: Computer Science, Data Structures, Cryptology and Information Theory, Computer Hardware, Electrical Engineering

Publication year
Information Security and Cryptography
Page amount
16 pages
Information Technology, Telecommunications

Similar titles