Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions

被引:26
|
作者
Armknecht, Frederik [1 ,2 ]
Maes, Roel [3 ,4 ]
Sadeghi, Ahmad-Reza [1 ]
Sunar, Berk [5 ]
Tuyls, Pim [3 ,4 ,6 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[2] Tech Univ Darmstadt, Darmstadt, Germany
[3] Katholieke Univ Leuven, ESAT COSIC, Leuven, Belgium
[4] Katholieke Univ Leuven, IBBT, Leuven, Belgium
[5] Worcester Polytech Inst, Cryptog & Informat Secur, Worcester, MA 01609 USA
[6] Intrins ID, NL-5656 AE Eindhoven, Netherlands
基金
美国国家科学基金会;
关键词
HARDWARE; SECURITY; BITS;
D O I
10.1007/978-3-642-14452-3_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:135 / 164
页数:30
相关论文
共 50 条
  • [1] Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
    Armknecht, Frederik
    Maes, Roel
    Sadeghi, Ahmad-Reza
    Sunar, Berk
    Tuyls, Pim
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 685 - +
  • [2] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [3] Memory leakage-resilient searchable symmetric encryption
    Dai, Shuguang
    Li, Huige
    Zhang, Fangguo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 76 - 84
  • [4] Verifiable memory leakage-resilient dynamic searchable encryption
    Guan, Wenhao
    Wang, Yunling
    Wang, Jianfeng
    Fu, Xiaotong
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2018, 24 (03) : 201 - 217
  • [5] Leakage-resilient certificate-based encryption
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3346 - 3355
  • [6] Leakage-Resilient Memory-based Physical Unclonable Function Using Phase Change Material
    Zhang, Le
    Chang, Chip-Hong
    Cabrini, Alessandro
    Torelli, Guido
    Kong, Zhi Hui
    [J]. 2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [7] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196
  • [8] Continuous leakage-resilient certificate-based encryption
    Li, Jiguo
    Guo, Yuyan
    Yu, Qihong
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    [J]. INFORMATION SCIENCES, 2016, 355 : 1 - 14
  • [9] Continuous leakage-resilient identity-based encryption with leakage amplification
    Yanwei Zhou
    Bo Yang
    Yi Mu
    [J]. Designs, Codes and Cryptography, 2019, 87 : 2061 - 2090
  • [10] Continuous leakage-resilient identity-based encryption with leakage amplification
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (09) : 2061 - 2090