
Florian Praden
Chercheur en cryptographie
Robust key extraction from Physical Uncloneable Functions
Applied Cryptography and Network Security (ACNS) 2005
,
Vol. 3531
,
pp. 407-422
,
2005
A PUF design for secure FPGA-based embedded systems
Design Automation Conference (ASP-DAC), 2010 15th Asia and South Pacific
,
pp. 1 -6
,
2010
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
ASIACRYPT '09: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security
,
pp. 685-702
,
2009
Physical Unclonable Functions and Their Applications to Vehicle System Security
Proc. IEEE 69th Vehicular Technology Conf. VTC Spring 2009
,
pp. 1-5
,
2009
An Anti-Counterfeiting Concept for Currency Systems
1983
What Size Net Gives Valid Generalization?
Neural Computation
,
Vol. 1
,
pp. 151-160
,
1989
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
pp. 206-220
,
2009
On Physical Obfuscation of Cryptographic Algorithms
INDOCRYPT '09: Proceedings of the 10th International Conference on Cryptology in India
,
pp. 88-103
,
2009
Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function
2007
Method and system for verifying authenticity safe against forgery
1980
How to Strongly Link Data and its Medium: the Paper Case
Vol. 4
,
pp. 125-136
,
2010
Universal classes of hash functions
Journal of Computer and System Sciences
,
Vol. 18
,
pp. 143 - 154
,
1979
PUF-based Encryption Processor for the RFID Systems
Proc. IEEE 10th Int Computer and Information Technology (CIT) Conf
,
pp. 2323-2328
,
2010
SRAM Characteristics as Physical Unclonable Functions
2009
SRAM Characteristics as Physical Unclonable Functions
2009
Counterfeit Deterrent Features for the Next-Generation Currency Design
The National Academies Press
,
1993
Efficient and practical authentication of PUF-based RFID tags in supply chains
Proc. IEEE Int RFID-Technology and Applications (RFID-TA) Conf
,
pp. 182-188
,
2010
The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime
2009
Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards
2008
On-Chip Electric Waves: An Analog Circuit Approach to Physical Uncloneable Functions
2009
Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications
Proc. IEEE Int RFID Conf
,
pp. 58-64
,
2008
Secure and Robust Error Correction for Physical Unclonable Functions
IEEE Design & Test of Computers
,
pp. 1
,
2009
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Vol. 3027
,
pp. 523-540
,
2004
facebook's annual conference
Wirelessly pickpocketing a mifare classic card
pp. 3–15
,
2009
Dismantling MIFARE Classic
Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
,
pp. 97-114
,
2008
Physical Random Functions
MIT
,
2003
Controlled Physical Unknown Functions: Applications to Secure Smartcards and Certified Execution
2002
Silicon physical random functions
Proceedings of the 9th ACM conference on Computer and communications security
,
pp. 148-160
,
2002
Identification and authentication of integrated circuits: Research Articles
Concurr. Comput. : Pract. Exper.
,
Vol. 16
,
pp. 1077-1098
,
2004
A Flexible Design Flow for Software IP Binding in FPGA
IEEEJIINF
,
Vol. 6
,
pp. 719-728
,
2010
A flexible design flow for software IP binding in commodity FPGA
Proc. IEEE Int. Symp. Industrial Embedded Systems SIES '09
,
pp. 211-218
,
2009
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
Information Systems Frontiers
,
Vol. 11
,
pp. 19-41
,
2009
Secure IP-block distribution for hardware devices
Proc. IEEE Int. Workshop Hardware-Oriented Security and Trust HOST '09
,
pp. 82-89
,
2009
Brand and IP protection with physical unclonable functions
Proc. IEEE Int. Symp. Circuits and Systems ISCAS 2008
,
pp. 3186-3189
,
2008
Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection
Proc. Int. Conf. Field Programmable Logic and Applications FPL 2007
,
pp. 189-195
,
2007
CDs Have Fingerprints Too
CHES '09: Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
,
pp. 348-362
,
2009
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
Proc. 47th ACM/IEEE Design Automation Conf. (DAC)
,
pp. 240-243
,
2010
A physical unclonable function defined using power distribution system equivalent resistance variations
DAC '09: Proceedings of the 46th Annual Design Automation Conference
,
pp. 676-681
,
2009
A physical unclonable function defined using power distribution system equivalent resistance variations
Proc. 46th ACM/IEEE Design Automation Conf. DAC '09
,
pp. 676-681
,
2009
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
IEEE Trans. Comput.
,
Vol. 58
,
pp. 1198-1210
,
2009
Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
In Proceedings of the Conference on RFID Security
,
2007
Shark
Journal of Machine Learning Research
,
Vol. 9
,
pp. 993-996
,
2008
Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method
Proc. IEEE Int Information Theory Symp
,
pp. 499-503
,
2006
Achieving Secure Fuzzy Commitment Scheme for Optical PUFs
Proc. Fifth Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing IIH-MSP '09
,
pp. 1185-1188
,
2009
Method and apparatus for fingerprinting magnetic media
1994
Anti-counterfeiting using phosphor PUF
Anti-counterfeiting, Security and Identification, 2008. ASID 2008. 2nd International Conference on
,
pp. 59 -62
,
2008
Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation
2012
Differential template attacks on PUF enabled cryptographic devices
Workshop on Information Forensics and Security (WIFS)
,
pp. 1-6
,
2010
Reverse-engineering a cryptographic rfid tag.
pp. 185-194
,
2008
Physically Restricted Authentication and Encryption for Cyber-physical Systems
DHS Workshop on Future Directions in Cyber-physical Systems Security
,
2009
Software Techniques to Combat Drift in PUF-based Authentication Systems
Workshop on Secure Component and System Identification (SECSI 2010)
,
pp. 9
,
2010
A Practical Attack on the MIFARE Classic
Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
,
pp. 267-282
,
2008
PROXMARK.org
2008
The butterfly PUF protecting IP on every FPGA
Proc. IEEE Int. Workshop Hardware-Oriented Security and Trust HOST 2008
,
pp. 67-70
,
2008
Reconfigurable Physical Unclonable Functions - Enabling technology for tamper-resistant storage
Proc. IEEE Int. Workshop Hardware-Oriented Security and Trust HOST '09
,
pp. 22-29
,
2009
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage
2nd IEEE International Workshop on Hardware-Oriented Security and Trust - HOST 2009
,
pp. 22-29
,
2009
RFID Privacy and Security
A technique to build a secret key in integrated circuits for identification and authentication applications
VLSI Circuits, 2004. Digest of Technical Papers. 2004 Symposium on
,
pp. 176 - 179
,
2004
Hardware intrinsic security from D flip-flops
Proceedings of the fifth ACM workshop on Scalable trusted computing
,
pp. 53-62
,
2010
Extracting Secret Keys from Integrated Circuits
MIT
,
2004
Extracting secret keys from integrated circuits
IEEEJVLSI
,
Vol. 13
,
pp. 1200-1205
,
2005
Low-power sub-threshold design of secure physical unclonable functions
ISLPED '10: Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design
,
pp. 43-48
,
2010
Design Optimization and Security Validation of Sub-Threshold PUFs
SECSI-2010
,
2010
Low-power sub-threshold design of secure physical unclonable functions
Proc. ACM/IEEE Int Low-Power Electronics and Design (ISLPED) Symp
,
pp. 43-48
,
2010
IC identification circuit using device mismatch
Solid-State Circuits Conference, 2000. Digest of Technical Papers. ISSCC. 2000 IEEE International
,
pp. 372 -373
,
2000
Statistical Analysis of Silicon PUF responses for Device Identification
Workshop on Secure Component and System Identification (SECSI 2008)
,
pp. 16
,
2008
Soft decision helper data algorithm for SRAM PUFs
ISIT'09: Proceedings of the 2009 IEEE international conference on Symposium on Information Theory
,
pp. 2101-2105
,
2009
A large scale characterization of RO-PUF
Proc. IEEE Int Hardware-Oriented Security and Trust (HOST) Symp
,
pp. 94-99
,
2010
Physical unclonable function and true random number generator: a compact and scalable implementation
ACM Great Lakes Symposium on VLSI
,
pp. 425-428
,
2009
Improving the quality of a Physical Unclonable Function using configurable Ring Oscillators
Proc. Int. Conf. Field Programmable Logic and Applications FPL 2009
,
pp. 703-707
,
2009
FPGA PUF using programmable delay lines
Information Forensics and Security (WIFS), 2010 IEEE International Workshop on
,
pp. 1-6
,
2010
Techniques for Design and Implementation of Secure Reconfigurable PUFs
ACM Trans. Reconfigurable Technol. Syst.
,
Vol. 2
,
pp. 1-33
,
2009
Testing Techniques for Hardware Security
Proc. IEEE Int. Test Conf. ITC 2008
,
pp. 1-10
,
2008
A logical calculus of the ideas immanent in nervous activity
Bulletin of Mathematical Biology
,
Vol. 5
,
pp. 115-133
,
1943
The success of MIFARE
2009
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Proceedings of the 18th ACM conference on Computer and communications security
,
pp. 111-124
,
2011
Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures - An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism
CT-RSA
,
pp. 1-18
,
2012
Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures - An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism
CT-RSA
,
pp. 1-18
,
2012
The Art of Error Correcting Coding
John Wiley & Sons
,
2006
Unforgeable identification device, identification device reader and method of identification
1994
Universal one-way hash functions and their cryptographic applications
Proceedings of the twenty-first annual ACM symposium on Theory of computing
,
pp. 33-43
,
1989
Mifare presentation
2008
Mifare: Little Security, Despite Obscurity
2007
From the bitstream to the netlist
Proceedings of the 16th international ACM/SIGDA symposium on Field programmable gate arrays
,
pp. 264-264
,
2008
Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World.
CHES
,
Vol. 6917
,
pp. 207-222
,
2011
Towards Robust Low Cost Authentication for Pervasive Devices
Proc. Sixth Annual IEEE Int. Conf. Pervasive Computing and Communications PerCom 2008
,
pp. 170-178
,
2008
Physical unclonable function with tristate buffers
Proc. IEEE Int. Symp. Circuits and Systems ISCAS 2008
,
pp. 3194-3197
,
2008
Creating a unique digital fingerprint using existing combinational logic
pp. 2693 -2696
,
2009
Protecting Devices by Active Coating
#j-jucs#
,
Vol. 4
,
pp. 652-668
,
1998
Variability: For headache and profit
IEEE Design & Test of Computers
,
Vol. 27
,
pp. 96-98
,
2010
Get a proxmark3
2009
CMOS unclonable system for secure authentication based on device variability
Proc. 34th European Solid-State Circuits Conf. ESSCIRC 2008
,
pp. 130-133
,
2008
Temperature-aware cooperative ring oscillator PUF
Proc. IEEE Int. Workshop Hardware-Oriented Security and Trust HOST '09
,
pp. 36-42
,
2009
Modeling attacks on physical unclonable functions
CCS 2010: Proceedings of the 17th ACM conference on Computer and communications security
,
pp. 237-249
,
2010
Implémentation en logique asynchrone d’un coprocesseur cryptographique à base de courbes elliptiques
2010
Spécification de bibliothèques pour la synthèse de circuits asynchrones
Institut National Polytechnique de Grenoble
,
2002
The Perceptron: A Probabilistic Model for Information Storage and Organization in the Brain
Psychological Review
,
Vol. 65
,
pp. 386-408
,
1958
Sensor physical unclonable functions
Proc. IEEE Int Hardware-Oriented Security and Trust (HOST) Symp
,
pp. 112-117
,
2010
Applications of High-Capacity Crossbar Memories in Cryptography
IEEEJNANO
,
pp. 1
,
2010
ReBit: A Tool to Manage and Analyse FPGA-Based Reconfigurable Systems
Proceedings of the 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and PhD Forum
,
pp. 220-227
,
2011
Identification of data, devices, documents and individuals
Security Technology, 1991. Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on
,
pp. 197 -218
,
1991
A System for Verifying User Identity and Authorization at the Point-Of Sale or Access
#j-CRYPTOLOGIA#
,
Vol. 8
,
pp. 1-21
,
1984
Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets
2009
Flowchart description of security primitives for Controlled Physical Unclonable Functions
2009
Information-theoretic analysis of capacitive physical unclonable functions
Journal of Applied Physics
,
Vol. 100
,
pp. 024902
,
2006
German Researchers Crack Mifare RFID Encryption
2011
Silicon Physical Unclonable Function resistant to a 1025-trial brute force attack in 90 nm CMOS
Proc. Symp. VLSI Circuits
,
pp. 116-117
,
2009
A 1.6pJ/bit 96% Stable Chip-ID Generating Circuit using Process Variations
Solid-State Circuits Conference, 2007. ISSCC 2007. Digest of Technical Papers. IEEE International
,
pp. 406-611
,
2007
AEGIS: A Single-Chip Secure Processor
Massachusetts Institute of Technology
,
2005
AEGIS: architecture for tamper-evident and tamper-resistant processing
ICS '03: Proceedings of the 17th annual international conference on Supercomputing
,
pp. 160-171
,
2003
Physical Unclonable Functions for Device Authentication and Secret Key Generation
Proc. 44th ACM/IEEE Design Automation Conf. DAC '07
,
pp. 9-14
,
2007
Aegis: A Single-Chip Secure Processor
IEEE Design & Test of Computers
,
Vol. 24
,
pp. 570-580
,
2007
The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes
Vol. 6225
,
pp. 366-382
,
2010
Reflective particle technology for identification of critical components
1992
Physical Unclonable Functions for enhanced security of tokens and tags
pp. 30-37
,
2006
In: Secret Key Generation from Classical Physics.
Springer
,
pp. 421-447
,
2005
Information-Theoretic Security Analysis of Physical Uncloneable Functions
Financial Cryptography and Data Security
,
pp. 141-155
,
2005
Read-Proof Hardware from Protective Coatings
Cryptographic Hardware and Embedded Systems - CHES 2006
,
Vol. 4249
,
pp. 369-383
,
2006
An information theoretic model for physical uncloneable functions
Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on
,
pp. 141-
,
2004
Classic mistakes
2009
Proxmark developers community
2009
Circuit-level techniques for reliable Physically Uncloneable Functions
HST '09: Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust
,
pp. 30-35
,
2009
Novel Physical Unclonable Function with process and environmental variations
Proc. Design, Automation & Test in Europe Conf. & Exhibition (DATE)
,
pp. 1065-1070
,
2010
A Test Instrument for HF/LF RFID
2009
Adaptive Switching Circuits
1960 IRE WESCON Convention Record, Part 4
,
pp. 96-104
,
1960
The Context Tree Weighting Method: Basic Properties
IEEE Transactions on Information Theory
,
Vol. 41
,
pp. 653-664
,
1995
LISA: Maximizing RO PUF's secret extraction
Proc. IEEE Int Hardware-Oriented Security and Trust (HOST) Symp
,
pp. 100-105
,
2010
Secure and Robust Error Correction for Physical Unclonable Functions
IEEE Design & Test of Computers
,
Vol. 27
,
pp. 48-65
,
2010
What's New
2007