Physical unclonable functions and applications: A tutorial
C Herder, MD Yu, F Koushanfar… - Proceedings of the …, 2014 - ieeexplore.ieee.org
This paper describes the use of physical unclonable functions (PUFs) in low-cost
authentication and key generation applications. First, it motivates the use of PUFs versus …
authentication and key generation applications. First, it motivates the use of PUFs versus …
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …
and so on represent a thriving surface for several security attacks with economic …
Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain
As the electronic component supply chain grows more complex due to globalization, with
parts coming from a diverse set of suppliers, counterfeit electronics have become a major …
parts coming from a diverse set of suppliers, counterfeit electronics have become a major …
RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning
Traditional authentication in radio-frequency (RF) systems enable secure data
communication within a network through techniques such as digital signatures and hash …
communication within a network through techniques such as digital signatures and hash …
ZeroTrace: Oblivious memory primitives from Intel SGX
We are witnessing a confluence between applied cryptography and secure hardware
systems in enabling secure cloud computing. On one hand, work in applied cryptography …
systems in enabling secure cloud computing. On one hand, work in applied cryptography …
Secure and robust error correction for physical unclonable functions
Physical unclonable functions (PUFs) offer a promising mechanism that can be used in
many security, protection, and digital rights management applications. One key issue is the …
many security, protection, and digital rights management applications. One key issue is the …
Iron: functional encryption using Intel SGX
B Fisch, D Vinayagamurthy, D Boneh… - Proceedings of the 2017 …, 2017 - dl.acm.org
Functional encryption (FE) is an extremely powerful cryptographic mechanism that lets an
authorized entity compute on encrypted data, and learn the results in the clear. However, all …
authorized entity compute on encrypted data, and learn the results in the clear. However, all …
Pseudo-haptic feedback: Can isometric input devices simulate force feedback?
This paper considers whether a passive isometric input device, such as a Spaceball/sup
TM/, used together with visual feedback, could provide the operator with a pseudo-haptic …
TM/, used together with visual feedback, could provide the operator with a pseudo-haptic …
A retrospective and a look forward: Fifteen years of physical unclonable function advancement
Severe security threats and alerts associated with the use of smart devices have drawn
increasing public attentions since the inception of Internet of Things (IoT) in late 1990s. IoT …
increasing public attentions since the inception of Internet of Things (IoT) in late 1990s. IoT …
An overview of the BlueGene/L supercomputer
NR Adiga, G Almási, GS Almasi, Y Aridor… - SC'02: Proceedings …, 2002 - ieeexplore.ieee.org
This paper gives an overview of the BlueGene/L Supercomputer. This is a jointly funded
research partnership between IBM and the Lawrence Livermore National Laboratory as part …
research partnership between IBM and the Lawrence Livermore National Laboratory as part …