Entry Gassend:2008:CPR from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
              
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Gassend:2008:CPR,
  author =       "Blaise Gassend and Marten {Van Dijk} and Dwaine Clarke
                 and Emina Torlak and Srinivas Devadas and Pim Tuyls",
  title =        "Controlled physical random functions and
                 applications",
  journal =      j-TISSEC,
  volume =       "10",
  number =       "4",
  pages =        "3:1--3:??",
  month =        jan,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1284680.1284683",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:24 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "The cryptographic protocols that we use in everyday
                 life rely on the secure storage of keys in consumer
                 devices. Protecting these keys from invasive attackers,
                 who open a device to steal its key, is a challenging
                 problem. We propose controlled physical random
                 functions (CPUFs) as an alternative to storing keys and
                 describe the core protocols that are needed to use
                 CPUFs. A physical random functions (PUF) is a physical
                 system with an input and output. The functional
                 relationship between input and output looks like that
                 of a random function. The particular relationship is
                 unique to a specific instance of a PUF, hence, one
                 needs access to a particular PUF instance to evaluate
                 the function it embodies. The cryptographic
                 applications of a PUF are quite limited unless the PUF
                 is combined with an algorithm that limits the ways in
                 which the PUF can be evaluated; this is a CPUF. A major
                 difficulty in using CPUFs is that you can only know a
                 small set of outputs of the PUF---the unknown outputs
                 being unrelated to the known ones. We present protocols
                 that get around this difficulty and allow a chain of
                 trust to be established between the CPUF manufacturer
                 and a party that wishes to interact securely with the
                 PUF device. We also present some elementary
                 applications, such as certified execution.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "certified execution; physical random function;
                 physical security; physical unclonable function;
                 trusted computing",
}
Related entries
- algorithm,
1(1)26,
2(1)3,
2(1)65,
2(1)105,
2(3)295,
9(2)162,
9(4)391,
9(4)421,
10(1)4,
11(1)4,
11(3)12,
12(2)8,
12(3)17,
12(4)20,
13(1)10,
13(3)20,
13(3)22,
13(3)24,
13(3)26,
13(3)27,
13(3)28,
13(4)36,
13(4)41,
14(1)3,
14(1)13,
14(3)25,
15(3)11,
15(4)15,
15(4)17,
16(1)4,
17(3)11,
17(4)13,
18(1)1,
18(1)4,
18(4)14
 
- allow,
2(4)390,
9(2)181,
10(3)10,
10(4)2,
11(1)2,
11(2)2,
11(2)4,
12(1)3,
12(1)6,
12(2)8,
12(2)10,
12(3)16,
12(3)18,
12(3)19,
13(3)21,
13(4)34,
13(4)38,
13(4)39,
13(4)41,
14(1)3,
14(1)5,
14(1)10,
14(3)25,
14(3)26,
14(3)27,
14(4)28,
14(4)29,
15(2)6,
15(2)9,
15(2)10,
16(1)3,
16(2)5,
16(3)9,
16(4)13,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)16,
18(3)10
 
- alternative,
2(1)3,
2(1)34,
2(3)295,
12(3)16,
15(2)10,
15(4)15,
17(2)8,
17(4)14,
18(4)13
 
- application,
1(1)66,
2(2)159,
2(2)177,
2(4)354,
4(2)103,
7(1)1,
7(1)97,
8(3)287,
9(1)1,
9(1)94,
10(1)2,
10(2)6,
11(1)2,
11(1)3,
11(3)14,
11(3)16,
11(4)22,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(4)21,
13(1)4,
13(1)10,
13(2)17,
13(3)22,
13(3)26,
13(4)38,
13(4)39,
14(1)2,
14(1)3,
14(1)6,
14(1)8,
14(1)9,
14(2)19,
14(3)27,
15(1)2,
15(1)4,
16(1)1,
16(1)2,
16(2)6,
16(3)9,
16(4)13,
16(4)17,
17(2)5,
17(4)13,
18(3)10,
18(4)12
 
- around,
16(2)6
 
- attacker,
2(2)159,
8(1)78,
10(1)4,
10(4)6,
11(3)12,
11(3)15,
12(1)4,
12(2)12,
12(3)17,
12(4)22,
13(4)37,
14(1)7,
14(1)13,
14(4)31,
15(1)2,
15(4)16,
17(2)8,
17(3)11,
17(4)13,
17(4)16,
18(1)1,
18(2)7,
18(4)13
 
- being,
9(4)421,
11(2)2,
11(3)14,
11(3)15,
12(2)12,
12(3)17,
13(4)35,
14(4)32,
16(2)6,
18(1)1,
18(2)5
 
- certified,
12(2)8
 
- chain,
2(2)159,
12(3)15,
14(1)5,
15(1)2,
15(4)17,
18(2)7
 
- challenging,
9(4)391,
11(3)14,
12(1)2,
13(3)20,
13(3)27,
15(2)9,
17(1)4
 
- combined,
10(4)5,
13(4)33,
14(2)15,
17(2)7,
17(4)16
 
- computing,
1(1)3,
1(1)66,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(4)354,
2(4)390,
11(1)3,
11(2)2,
12(1)6,
12(2)8,
12(3)15,
13(3)25,
16(3)11,
18(3)11
 
- consumer,
14(1)13,
18(2)5
 
- controlled,
9(4)421,
12(3)14,
16(4)14,
17(3)12
 
- core,
10(3)9,
12(2)8,
14(1)7,
15(1)4,
15(2)6,
16(4)17,
18(4)12
 
- cryptographic,
2(3)230,
2(4)354,
2(4)390,
2(4)416,
9(2)181,
10(2)6,
10(3)10,
11(3)12,
12(2)9,
13(1)2,
14(1)10,
14(1)11,
14(1)14,
15(1)3,
15(2)9,
16(1)2,
16(2)6,
17(2)7,
17(3)10,
18(1)3
 
- describe,
1(1)66,
2(1)3,
2(1)34,
2(1)105,
2(2)159,
2(2)177,
2(3)230,
2(4)354,
2(4)390,
7(2)319,
11(4)21,
12(1)1,
12(2)11,
12(3)16,
12(4)21,
13(4)30,
13(4)34,
14(3)24,
14(3)27,
15(3)11,
15(3)13,
16(3)10,
16(3)12,
16(4)14,
17(2)5,
18(2)8
 
- device,
2(3)230,
10(4)4,
11(2)2,
11(3)14,
12(3)15,
13(4)30,
14(1)7,
15(1)4,
15(2)7,
16(2)6,
16(3)10,
17(3)10,
17(4)14,
17(4)16,
18(2)7
 
- difficulty,
3(3)186,
11(3)16,
17(1)2
 
- established,
12(1)1
 
- evaluate,
2(2)138,
2(4)354,
11(2)3,
11(3)12,
11(3)14,
13(3)26,
13(4)30,
13(4)35,
14(1)3,
15(3)13,
15(4)17,
16(1)2,
16(2)6,
17(1)1,
17(2)8,
17(4)14,
18(4)14
 
- evaluated,
11(4)17,
13(3)26,
15(4)17,
16(4)16,
16(4)17
 
- execution,
1(1)26,
12(2)10,
12(2)11,
12(3)14,
14(1)6,
14(2)15,
14(4)32,
15(1)2,
15(2)10,
15(3)13,
16(1)3,
16(2)6,
16(2)7,
18(1)2,
18(1)4
 
- function,
2(3)230,
2(4)390,
9(2)181,
10(2)7,
11(4)18,
11(4)22,
12(1)1,
12(3)18,
13(1)10,
13(4)33,
16(2)6,
17(4)14,
18(1)1
 
- functional,
10(4)2,
12(1)4,
15(1)3
 
- get,
12(3)19,
15(2)6,
15(3)14
 
- hence,
2(1)105,
2(4)390,
11(3)14,
14(1)9,
14(4)32
 
- input,
10(4)4,
12(2)10,
14(1)7,
14(3)27,
14(4)32,
15(4)15,
15(4)17,
16(1)4,
16(2)6,
18(1)4
 
- instance,
2(1)65,
2(2)177,
2(3)295,
10(1)4,
12(4)20,
13(4)35,
14(1)9,
17(3)9
 
- interact,
11(1)2
 
- invasive,
2(2)177,
11(3)16
 
- know,
15(3)14,
17(2)7
 
- known,
10(3)11,
10(4)1,
11(2)1,
11(2)3,
11(2)4,
11(4)20,
13(1)10,
13(3)27,
13(4)33,
14(1)7,
14(3)27,
17(1)2,
17(2)7,
18(1)1
 
- like,
2(2)159,
11(2)6,
12(2)8,
12(2)11,
13(3)24,
17(3)11
 
- limit,
2(2)159,
12(3)17,
13(4)39,
15(3)14
 
- limited,
12(1)2,
12(3)18,
14(4)31,
17(1)2,
17(3)9,
17(3)10,
18(2)7
 
- look,
2(3)269,
12(2)12
 
- major,
9(4)391,
10(3)12,
14(3)24
 
- manufacturer,
15(2)7
 
- need,
2(2)177,
2(3)230,
2(4)390,
9(4)421,
10(4)2,
12(3)17,
13(3)22,
15(4)17,
15(4)18,
16(2)6,
17(3)10,
18(2)6,
18(2)7
 
- needed,
2(3)332,
14(1)5,
15(2)10,
15(4)15,
17(4)13,
18(2)6
 
- one,
1(1)26,
1(1)93,
2(1)3,
2(1)65,
2(3)295,
9(4)461,
10(1)2,
10(2)5,
10(2)8,
10(3)12,
11(2)6,
11(3)14,
12(1)1,
12(1)5,
12(2)13,
12(3)14,
13(3)21,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)3,
14(1)5,
14(4)30,
14(4)32,
15(2)10,
15(3)11,
15(4)16,
15(4)18,
16(1)3,
16(1)4,
16(3)9,
16(4)14,
17(2)8,
17(4)13,
18(1)1,
18(3)11,
18(4)13
 
- only,
2(3)230,
2(3)295,
11(1)3,
11(2)4,
11(3)13,
11(4)20,
12(1)2,
12(1)3,
12(2)13,
12(3)19,
12(4)21,
13(1)10,
13(3)25,
13(3)28,
13(4)35,
13(4)37,
13(4)39,
14(1)5,
14(1)11,
14(3)26,
14(4)31,
15(2)9,
15(4)16,
15(4)18,
16(1)3,
16(2)6,
16(2)7,
16(3)9,
16(3)10,
16(4)13,
17(3)9,
17(4)15,
18(2)5,
18(2)8
 
- open,
10(3)12,
11(1)2,
15(2)9,
16(4)15
 
- output,
13(1)10,
14(1)7,
14(3)26,
14(4)30,
16(2)6,
17(3)12
 
- particular,
2(2)177,
2(4)390,
10(4)1,
10(4)2,
11(2)6,
12(4)21,
13(4)40,
14(1)2,
15(3)14,
16(2)5,
17(3)9,
17(4)14
 
- party,
9(4)421,
10(2)8,
11(2)4,
11(2)6,
12(1)6,
12(2)12,
13(3)22,
13(4)39,
14(4)29,
15(2)9,
17(3)9
 
- physical,
10(1)2,
11(2)2,
11(3)12,
11(3)14,
11(4)22,
14(2)16,
15(2)7,
17(4)13,
17(4)16
 
- present,
1(1)26,
2(1)3,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(3)295,
2(4)354,
7(2)319,
9(2)181,
9(4)461,
10(1)2,
10(2)7,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
11(1)2,
11(1)4,
11(2)2,
11(2)5,
11(3)14,
11(4)22,
12(1)2,
12(1)4,
12(2)10,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(3)17,
12(4)22,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(3)28,
13(4)29,
13(4)41,
14(1)4,
14(1)5,
14(1)6,
15(1)2,
15(2)6,
15(2)8,
15(2)10,
15(3)12,
15(3)13,
15(4)16,
15(4)18,
16(2)6,
16(2)7,
16(4)13,
16(4)14,
17(1)4,
17(2)6,
17(2)7,
17(2)8,
17(3)9,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(1)3,
18(1)4,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
 
- problem,
1(1)3,
2(3)269,
2(3)295,
5(3)238,
9(2)162,
9(4)391,
10(2)5,
10(2)8,
10(3)9,
10(3)10,
10(3)12,
10(4)1,
11(2)2,
11(3)12,
11(3)15,
11(4)19,
12(1)2,
12(1)6,
12(2)9,
12(3)18,
12(4)20,
13(3)22,
13(3)26,
13(3)27,
13(4)33,
13(4)36,
13(4)40,
14(3)25,
14(4)31,
15(4)15,
15(4)18,
16(1)3,
16(1)4,
16(3)11,
16(4)15,
17(2)8,
17(3)11,
17(4)15,
18(1)3
 
- propose,
1(1)26,
2(1)65,
2(2)138,
2(3)269,
9(2)162,
9(4)391,
9(4)421,
10(1)3,
10(1)4,
10(3)12,
10(4)1,
10(4)4,
10(4)6,
11(1)3,
11(1)4,
11(3)12,
11(3)15,
11(4)18,
11(4)19,
11(4)23,
12(1)4,
12(2)8,
12(2)11,
12(2)13,
12(3)18,
13(3)28,
13(4)32,
13(4)36,
13(4)40,
13(4)41,
14(1)5,
14(1)10,
14(1)11,
14(3)24,
14(3)26,
14(4)30,
15(2)7,
15(4)17,
16(1)2,
16(4)15,
16(4)16,
17(1)1,
17(3)10,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
18(1)2,
18(2)7
 
- protecting,
1(1)66,
2(3)269,
2(4)354,
13(3)22,
15(2)9
 
- quite,
11(4)21
 
- random,
11(2)3,
11(2)4,
11(3)13,
11(3)15,
12(1)2,
12(3)18,
13(1)10,
14(1)12,
15(2)9,
15(3)12
 
- relationship,
2(1)3,
2(4)390,
6(1)43,
9(2)162,
9(4)391,
10(4)2,
12(1)2,
13(4)40,
14(3)24,
14(4)30,
15(4)18,
17(2)7
 
- rely,
10(4)6,
11(2)6,
12(1)3,
13(4)38,
14(1)9,
15(1)3,
16(1)1,
16(4)13,
16(4)14,
18(1)2
 
- secure,
1(1)93,
2(2)159,
2(2)177,
2(3)332,
2(4)390,
4(1)72,
4(2)103,
4(2)134,
4(4)321,
5(3)290,
6(4)472,
7(4)523,
9(1)1,
9(1)31,
9(1)94,
9(2)162,
9(4)461,
10(2)8,
10(3)10,
10(3)11,
10(4)6,
11(2)4,
11(2)5,
11(3)13,
11(3)14,
11(4)18,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(1)6,
12(3)16,
12(3)18,
12(4)21,
12(4)22,
13(1)9,
13(3)21,
13(3)28,
13(4)29,
14(3)23,
14(3)27,
14(4)31,
15(2)6,
15(2)9,
16(3)11,
16(4)15,
17(2)5,
17(2)6,
17(4)13,
18(2)5,
18(4)13
 
- securely,
11(1)4,
12(3)19
 
- set,
2(1)34,
2(2)138,
2(4)390,
8(1)3,
9(4)421,
10(2)5,
10(3)12,
10(4)2,
10(4)5,
11(2)1,
11(2)3,
11(3)13,
11(4)18,
11(4)21,
12(2)11,
12(3)18,
12(3)19,
12(4)20,
12(4)21,
13(1)9,
13(1)10,
13(3)27,
13(4)40,
14(1)12,
14(3)25,
14(4)31,
15(1)2,
15(2)7,
15(2)10,
15(3)13,
15(4)15,
16(1)4,
17(1)2,
17(2)8,
17(3)11,
17(4)13,
17(4)14,
18(1)4,
18(3)10,
18(3)11
 
- small,
2(3)295,
10(3)11,
10(4)5,
12(1)6,
12(3)15,
12(3)16,
12(3)18,
12(4)21,
14(1)12,
15(1)3,
15(1)4,
15(4)15,
16(1)1,
17(4)15,
18(2)5
 
- specific,
1(1)26,
10(2)6,
10(4)4,
11(4)19,
12(1)6,
13(3)26,
14(1)5,
14(1)9,
15(2)6,
16(3)10,
18(1)2
 
- storage,
2(3)295,
2(4)354,
9(1)1,
11(1)4,
12(1)3,
12(3)15,
12(3)16,
12(3)18,
13(3)22,
13(4)30,
13(4)37,
14(1)12,
14(2)20,
15(2)6,
15(2)9,
16(3)12,
17(3)10,
17(4)15
 
- storing,
12(3)18
 
- trust,
5(2)95,
6(1)1,
7(1)21,
7(3)428,
9(3)352,
9(4)391,
10(3)11,
10(3)12,
10(4)4,
11(1)2,
12(1)2,
12(1)6,
12(2)8,
13(1)2,
13(1)5,
13(2)16,
14(4)29,
17(2)6
 
- trusted,
2(2)138,
2(3)269,
8(2)153,
11(2)6,
11(3)14,
12(1)3,
13(4)39,
14(1)8,
14(3)27,
14(4)29,
15(2)9,
16(2)5,
16(2)7,
16(4)15,
17(2)6,
18(2)8
 
- unique,
11(3)12,
12(3)16,
15(3)12,
16(4)14,
17(4)16,
18(2)7,
18(3)11
 
- unknown,
4(3)275,
11(3)16,
14(1)13,
16(3)10
 
- unless,
2(2)177,
11(3)13,
18(1)2
 
- use,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)390,
4(2)103,
7(1)21,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(2)5,
10(3)11,
10(4)1,
10(4)5,
10(4)6,
11(1)2,
11(1)3,
11(1)4,
11(2)1,
11(2)4,
11(3)13,
11(3)14,
11(4)18,
11(4)19,
11(4)21,
11(4)22,
12(2)10,
12(3)16,
12(3)18,
13(3)22,
13(3)24,
13(3)25,
13(4)29,
13(4)31,
13(4)36,
14(1)6,
14(1)8,
14(1)10,
14(1)11,
14(4)31,
14(4)32,
15(1)3,
15(1)4,
15(1)5,
15(2)7,
15(3)12,
15(4)15,
15(4)16,
15(4)17,
16(2)8,
16(4)15,
16(4)17,
17(2)5,
17(2)6,
17(2)7,
17(2)8,
17(4)15,
17(4)16,
18(1)1,
18(2)6,
18(3)9,
18(4)14
 
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)6,
11(1)2,
11(2)1,
11(2)2,
11(2)3,
11(3)14,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)35,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)11,
15(3)12,
15(4)15,
15(4)17,
16(1)1,
16(1)2,
16(1)4,
16(2)5,
16(2)6,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
17(4)14,
17(4)16,
18(2)7,
18(2)8,
18(3)10,
18(3)11,
18(4)14
 
- way,
2(1)3,
2(1)65,
2(3)230,
2(3)269,
2(4)416,
9(4)461,
10(4)4,
11(1)2,
11(3)13,
12(1)5,
12(2)8,
12(2)11,
12(3)14,
13(1)10,
13(3)22,
13(3)28,
13(4)34,
15(2)10,
15(4)15,
16(3)10,
16(3)11,
16(4)17,
17(2)6
 
- who,
1(1)26,
1(1)66,
11(3)12,
11(4)19,
11(4)23,
12(1)2,
12(2)9,
13(4)39,
13(4)40,
15(3)14,
16(2)8,
17(1)4,
18(4)13
 
- wish,
12(2)9,
17(1)4