Sciweavers

14 search results - page 1 / 3
» Delay-Based Circuit Authentication and Applications
Sort
View
SAC
2003
ACM
14 years 4 months ago
Delay-Based Circuit Authentication and Applications
Blaise Gassend, Dwaine E. Clarke, Marten van Dijk,...
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
14 years 5 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
ISW
2009
Springer
14 years 5 months ago
MAC Precomputation with Applications to Secure Memory
We present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, Sh...
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
CVPR
2008
IEEE
14 years 19 days ago
Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model
Most digital still color cameras use a single electronic sensor (CCD or CMOS) overlaid with a color filter array. At each pixel location only one color sample is taken, and the ot...
Yizhen Huang, Yangjing Long
HOST
2008
IEEE
14 years 5 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach