Abstract is missing.
- Physically Unclonable Functions: A Study on the State of the Art and Future Research DirectionsRoel Maes, Ingrid Verbauwhede. 3-37 [doi]
- Hardware Intrinsic Security from Physically Unclonable FunctionsHelena Handschuh, Geert Jan Schrijen, Pim Tuyls. 39-53 [doi]
- From Statistics to Circuits: Foundations for Future Physical Unclonable FunctionsInyoung Kim, Abhranil Maiti, Leyla Nazhandali, Patrick Schaumont, Vignesh Vivekraja, Huaiye Zhang. 55-78 [doi]
- Strong PUFs: Models, Constructions, and Security ProofsUlrich Rührmair, Heike Busch, Stefan Katzenbeisser. 79-96 [doi]
- Leakage Resilient Cryptography in PracticeFrançois-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald. 99-134 [doi]
- Memory Leakage-Resilient Encryption Based on Physically Unclonable FunctionsFrederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls. 135-164 [doi]
- Hardware Trojan HorsesMohammad Tehranipoor, Berk Sunar. 167-187 [doi]
- Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning No ResultsYoo-Jin Baek, Vanessa Gratzer, Sung Hyun Kim, David Naccache. 189-197 [doi]
- License Distribution Protocols from Optical Media FingerprintsGhaith Hammouri, Aykutlu Dana, Berk Sunar. 201-222 [doi]
- Anti-counterfeiting: Mixing the Physical and the Digital WorldDarko Kirovski. 223-233 [doi]
- Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and HardwareYong Ki Lee, Lejla Batina, Dave Singelée, Bart Preneel, Ingrid Verbauwhede. 237-257 [doi]
- Contactless Security Token Enhanced Security by Using New Hardware Features in Cryptographic-Based Security MechanismsMarkus Ullmann, Matthias Vögeler. 259-279 [doi]
- Enhancing RFID Security and Privacy by Physically Unclonable FunctionsAhmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann. 281-305 [doi]
- Authentication of Processor Hardware Leveraging Performance Limits in Detailed Simulations and EmulationsDaniel Y. Deng, Andrew H. Chan, G. Edward Suh. 309-329 [doi]
- Signal Authentication in Trusted Satellite Navigation ReceiversMarkus G. Kuhn. 331-348 [doi]
- On the Limits of Hypervisor- and Virtual Machine Monitor-Based IsolationLoïc Duflot, Olivier Grumelard, Olivier Levillain, Benjamin Morin. 349-366 [doi]
- Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version)Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003. 367-386 [doi]
- Towards Reliable Remote Healthcare Applications Using Combined Fuzzy ExtractionJorge Guajardo, Muhammad Asim, Milan Petkovic. 387-407 [doi]