Back to Results
First PageMeta Content
Data / Information / Communications protocol / Challenge-response authentication / Cryptography / Physical Unclonable Function / Randomness


2013 IEEE Symposium on Security and Privacy PUFs in Security Protocols: Attack Models and Security Evaluations
Add to Reading List

Document Date: 2013-04-05 19:56:34


Open Document

File Size: 240,56 KB

Share Result on Facebook

City

A PUF / /

Country

Germany / /

Currency

USD / /

/

Facility

ATTACK M ODELS FOR S TRONG PUF P ROTOCOLS Building / /

IndustryTerm

hardware systems / malicious hardware / minuscule manufacturing irregularities / cryptographic protocols / given protocol / simulation algorithm / identiļ¬cation protocols / above protocols / electronic devices / classical cryptographic protocols / wireless triggering / bank card / software attacks / security protocols / et al. give several protocols / session key exchange protocol / /

Organization

MIT / /

Person

Bob / Ron Rivest / Alice / Claire / /

Position

author / challenge logger / re-use model / the PAM / logger / /

ProgrammingLanguage

R / /

ProvinceOrState

California / Massachusetts / /

Technology

PUF-based security protocols / existing protocols / identiļ¬cation protocols / simulation algorithm / laser / cryptography / The KE protocol / typical two-party protocol / three above protocols / early KE-protocol / key exchange protocol / classical cryptographic protocols / OT protocol / 287 known PUF-protocols / PUF-based session key exchange protocol / The protocol / analyzed PUF-protocols / PUF protocol / smart card / attacked protocol / cryptographic PUF protocols / given protocol / two protocols / secret key / considered protocols / BC protocol / KE protocol / simulation / same protocol / recent KE-protocol / early OT-protocol / recent OT protocol / PUF protocols / two protocol / evaluated protocols / recent BC-protocol / OT protocols / /

SocialTag