Mostrar el registro sencillo del ítem

Ponencia

dc.creatorEiroa, Susanaes
dc.creatorBaturone Castillo, María Iluminadaes
dc.date.accessioned2017-03-24T14:22:31Z
dc.date.available2017-03-24T14:22:31Z
dc.date.issued2010
dc.identifier.citationEiroa, S. y Baturone Castillo, M.I. (2010). Hardware authentication based on PUFs and SHA-3 2nd round candidates. En International Conference on Microelectronics (319-322), El Cairo: Institute of Electrical and Electronics Engineers.
dc.identifier.isbn978-1-61284-149-6es
dc.identifier.urihttp://hdl.handle.net/11441/56249
dc.description.abstractSecurity features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted. Silicon Physical Unclonable Functions (PUFs) or Physical Random Functions, which exploits manufacturing process variations in integrated circuits, have been used to authenticate the hardware in which they are included and, based on them, several cryptographic protocols have been reported. This paper describes the hardware implementation of a symmetric-key authentication protocol in which a PUF is one of the relevant blocks. The second relevant block is a SHA-3 2nd round candidate, a Secure Hash Algorithm (in particular Keccak), which has been proposed to replace the SHA-2 functions that have been broken no long time ago. Implementation details are discussed in the case of Xilinx FPGAs.es
dc.description.sponsorshipJunta de Andalucía P08-TIC-03674es
dc.description.sponsorshipComunidad Europea FP7-INFSO-ICT-248858es
dc.description.sponsorshipMinisterio de Ciencia y Tecnología TEC2008-04920 y DPI2008-03847es
dc.formatapplication/pdfes
dc.language.isoenges
dc.publisherInstitute of Electrical and Electronics Engineerses
dc.relation.ispartofInternational Conference on Microelectronics (2010), pp. 319-322.
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectHash functiones
dc.subjectLightweight protocoles
dc.subjectPhysically unclonable functiones
dc.subjectTrue random number generatores
dc.titleHardware authentication based on PUFs and SHA-3 2nd round candidateses
dc.typeinfo:eu-repo/semantics/conferenceObjectes
dcterms.identifierhttps://ror.org/03yxnpp24
dc.type.versioninfo:eu-repo/semantics/acceptedVersiones
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.contributor.affiliationUniversidad de Sevilla. Departamento de Electrónica y Electromagnetismoes
dc.relation.projectIDP08-TIC-03674es
dc.relation.projectIDEC/FP7/248858es
dc.relation.projectIDTEC2008-04920es
dc.relation.projectIDDPI2008-03847es
dc.relation.publisherversionhttps://doi.org/10.1109/ICM.2010.5696149es
dc.identifier.doi10.1109/ICM.2010.5696149es
idus.format.extent4 p.es
dc.publication.initialPage319es
dc.publication.endPage322es
dc.eventtitleInternational Conference on Microelectronicses
dc.eventinstitutionEl Cairoes

FicherosTamañoFormatoVerDescripción
Hardware authentication.pdf197.0KbIcon   [PDF] Ver/Abrir  

Este registro aparece en las siguientes colecciones

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como: Attribution-NonCommercial-NoDerivatives 4.0 Internacional