References
- B. Gassend, D. Clarke, M. V. Dijk, and S. Devadas, "Silicon physical random functions," in Proc. 9th ACM Conf. Comput. Commun. Security, pp. 148-160, USA, Nov. 2002.
- G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Proc. 44th Annu. ACM IEEE Design Automation Conf., pp. 9-14, USA, Jun. 2007.
- G. E. Suh, C. W. O'Donnell, and S. Devadas, "Aegis: A single-chip secure processor," IEEE Design & Test of Computers, vol. 24, no. 6, pp. 570-580, Nov.-Dec. 2007. https://doi.org/10.1109/MDT.2007.179
- S. E. Sarma, S. A. Weis, and D. W. Engels, "Radio-frequency identification: Security risks and challenges," RSA Laboratories Cryptobytes, vol. 6, no. 1, 2003.
- K. Finkenzeller, RFID Handbook: Fundamentals and Application in Contactless Smart Cards and Identification, 2nd Ed, NY: Wiley, 2003.
- B. Gassend, D. Clarke, M. V. Dijk, and S. Devadas, "Delay-based circuit authentications and applications," in Proc. 2003 ACM Symp. Appl. Comput., pp. 294-301, 2003.
- E. Ozturk, G. Hammouri, and B. Sunar, "Towards robust low cost authentication for pervasive devices," 6th Annu. IEEE Int. Conf. Pervasive Comput. Commun., pp. 170-178, Mar. 2008.
- D. Naccache and P. Fremanteau, "Unforgeable identification device, identification device reader and method of identification," U.S. Patent, no. 5,434,917, Jul. 1995.
- S. Mangard, M. Aigner, and S. Dominikus, "A highly regular and scalable AES hardware architecture," IEEE Trans. Computers, vol. 52, no. 4, Apr. 2003.
- M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Lightweight secure PUFs," IEEE/ACM Int. Conf. Computer-Aided Design, pp. 670-673, Nov. 2008.
- D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. V. Dijk, and S. Devadas, "Extracting secret keys from integrated circuits," IEEE Trans. Very Large Scale Integration (VLSI) Syst., vol. 13, pp. 1200-1205, Oct. 2005. https://doi.org/10.1109/TVLSI.2005.859470
- P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, "A minimalist mutual-authentication protocol for low-cost RFID tags," Ubiquitous Intelligence and Computing, vol. 4159, pp. 912-923, 2006.
- M. Feldhofer and C. Rechberger, "A case against currently used hash functions in RFID protocols," OTM Workshops 2006, vol. 4277, pp. 372-381, 2006.
- Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, "Elliptic-curve-based Security Processor for RFID," IEEE Trans. Computers, vol. 57, no. 11, Nov. 2008.
- M. Stamp, Information Security Textbook (Principles And Practice), 1st Ed., NY: John Willey & Sons Inc., 2005.
- S. Oh, K. Chung, T. Yun, and K. Ahn, "An RFID mutual authentication protocol using one-time random number," J. KICS, vol. 36, no. 7, pp. 858-867, 2011. https://doi.org/10.7840/KICS.2011.36B.7.858
- J. Shin, S. Oh, C. Jeong, K. Chung, and K. Ahn, "Improved an RFID mutual authentication protocol based on hash function," J. KICS, vol. 37C, no. 3, 2012. https://doi.org/10.7840/KICS.2012.37C.3.241
- J. Lee, S. Oh, T. Yun, K. Chung, and K. Ahn, "An ultra-lightweight RFID authentication protocol using index," J. KICS, vol. 37C, no. 1, 2012. https://doi.org/10.7840/KICS.2012.37C.1.24
- W. Choi, S. Kim, Y. Kim, Y. Park, and K. Ahn, "PUF-based encryption processor for the RFID systems," 2010 IEEE 10th Int. Conf. Comput. Inf. Technol(CIT)., pp. 2323-2328, Bradford, Jun.-Jul. 2010.