BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (12)
attack (7)
design (5)
secur (5)
ring (4)

Stem puf$ (all stems)

24 papers:

DACDAC-2015-RoseM #analysis #design #performance
Performance analysis of a memristive crossbar PUF design (GSR, CAM), p. 6.
DATEDATE-2015-NguyenSCM #performance #robust #set
Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set (PHN, DPS, RSC, DM), pp. 641–646.
DATEDATE-2015-VatajeluNIP
STT MRAM-Based PUFs (EIV, GDN, MI, PP), pp. 872–875.
DATEDATE-2015-VijayakumarK #design #modelling #novel
A novel modeling attack resistant PUF design based on non-linear voltage transfer characteristics (AV, SK), pp. 653–658.
DACDAC-2014-GaoLQ #flexibility
A Highly Flexible Ring Oscillator PUF (MG, KL, GQ), p. 6.
DACDAC-2014-KongKPSW #embedded #framework #named #novel
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs (JK, FK, PKP, ARS, CW), p. 6.
DATEDATE-2014-BhargavaM #encryption #generative #performance #reliability
An efficient reliable PUF-based cryptographic key generator in 65nm CMOS (MB, KM), pp. 1–6.
DATEDATE-2014-CortezRHN #testing
Testing PUF-based secure key storage circuits (MC, GR, SH, GDN), pp. 1–6.
DATEDATE-2014-DelvauxV
Key-recovery attacks on various RO PUF constructions via helper data manipulation (JD, IV), pp. 1–6.
DATEDATE-2014-DijkR #protocol
Protocol attacks on advanced PUF protocols and countermeasures (MvD, UR), pp. 1–6.
DATEDATE-2014-HillerS #performance
Increasing the efficiency of syndrome coding for PUFs with helper data compression (MH, GS), pp. 1–6.
DATEDATE-2014-RahmanFFT #design #named
ARO-PUF: An aging-resistant ring oscillator PUF design (MTR, DF, JF, MT), pp. 1–6.
DATEDATE-2014-RostamiWPK #challenge #roadmap #security
Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security (MR, JBW, MP, FK), pp. 1–6.
DATEDATE-2014-RuhrmairH
PUFs at a glance (UR, DEH), pp. 1–6.
DATEDATE-2014-RuhrmairS #bibliography #modelling #perspective
PUF modeling attacks: An introduction and overview (UR, JS), pp. 1–6.
DATEDATE-2014-RuhrmairSB #how
Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks (UR, US, WB), pp. 1–4.
DATEDATE-2014-XuB #hybrid #question
Hybrid side-channel/machine-learning attacks on PUFs: A new threat? (XX, WB), pp. 1–6.
DACDAC-2013-YinQ #security
Improving PUF security with regression-based distiller (CEDY, GQ), p. 6.
DATEDATE-2013-KoeberlKS #generative
Memristor PUFs: a new generation of memory-based physically unclonable functions (PK, ÜK, ARS), pp. 428–431.
DATEDATE-2013-YaoKLMK #named #network #physics
ClockPUF: physical unclonable functions based on clock networks (YY, MK, JL, ILM, FK), pp. 422–427.
DATEDATE-2013-YinQZ #design #implementation
Design and implementation of a group-based RO PUF (CEDY, GQ, QZ), pp. 416–421.
DATEDATE-2012-ChenCLSR
Characterization of the bistable ring PUF (QC, GC, PL, US, UR), pp. 1459–1462.
DATEDATE-2012-DasKSV #design #encryption #testing
PUF-based secure test wrapper design for cryptographic SoC testing (AD, ÜK, ARS, IV), pp. 866–869.
DATEDATE-2012-SchrijenL #analysis #comparative
Comparative analysis of SRAM memories used as PUF primitives (GJS, VvdL), pp. 1319–1324.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.