Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption
IACR ePrint Archive, Report 2015/651
2015
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
IACR ePrint Archive, Report 2015/854
2015
Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements
COSADE
Berlin, Germany
2015
Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment
COSADE
Berlin, Germany
2015
Efficient and Flexible NoC-Based Group Communication for Secure MPSoCs
6 pages
10th International Conference on ReConFigurable Computing and FPGAs (RECONFIG 2015)
Mayan Riviera, Mexico
2015
A Non-intrusive and Reconfigurable Access Control to Secure NoCs
6 pages
22nd IEEE International Conference on Electronics, Circuits and Systems (ICECS 2015)
Cairo, Egypt
2015
Area-Efficient PUF-Based Key Generation on System-on-Chips with FPGAs
Journal of Circuits, Systems and Computers
2015
Volume No.25, Issue No. 1
Oct
20 pages
seTPM: Towards Flexible Trusted Computing on Mobile Devices based on GlobalPlatform Secure Elements
CARDIS 2015
Bochum, Germany
2015
Efficient Evaluation of Physical Unclonable Functions Using Entropy Measures
Journal of Circuits, Systems and Computers
2015
Vol. 25, No. 1 (2016) 1640001
Oct
23 pages
Design of the Secure Execution PUF-based Processor (SEPP)
TRUDEVICE Workshop on Secure Hardware and Security Evaluation
Saint Malo, Frankreich
2015