dc.creator | Eiroa, Susana | es |
dc.creator | Baturone Castillo, María Iluminada | es |
dc.date.accessioned | 2017-03-24T14:22:31Z | |
dc.date.available | 2017-03-24T14:22:31Z | |
dc.date.issued | 2010 | |
dc.identifier.citation | Eiroa, S. y Baturone Castillo, M.I. (2010). Hardware authentication based on PUFs and SHA-3 2nd round candidates. En International Conference on Microelectronics (319-322), El Cairo: Institute of Electrical and Electronics Engineers. | |
dc.identifier.isbn | 978-1-61284-149-6 | es |
dc.identifier.uri | http://hdl.handle.net/11441/56249 | |
dc.description.abstract | Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted. Silicon Physical Unclonable Functions (PUFs) or Physical Random Functions, which exploits manufacturing process variations in integrated circuits, have been used to authenticate the hardware in which they are included and, based on them, several cryptographic protocols have been reported. This paper describes the hardware implementation of a symmetric-key authentication protocol in which a PUF is one of the relevant blocks. The second relevant block is a SHA-3 2nd round candidate, a Secure Hash Algorithm (in particular Keccak), which has been proposed to replace the SHA-2 functions that have been broken no long time ago. Implementation details are discussed in the case of Xilinx FPGAs. | es |
dc.description.sponsorship | Junta de Andalucía P08-TIC-03674 | es |
dc.description.sponsorship | Comunidad Europea FP7-INFSO-ICT-248858 | es |
dc.description.sponsorship | Ministerio de Ciencia y Tecnología TEC2008-04920 y DPI2008-03847 | es |
dc.format | application/pdf | es |
dc.language.iso | eng | es |
dc.publisher | Institute of Electrical and Electronics Engineers | es |
dc.relation.ispartof | International Conference on Microelectronics (2010), pp. 319-322. | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | Hash function | es |
dc.subject | Lightweight protocol | es |
dc.subject | Physically unclonable function | es |
dc.subject | True random number generator | es |
dc.title | Hardware authentication based on PUFs and SHA-3 2nd round candidates | es |
dc.type | info:eu-repo/semantics/conferenceObject | es |
dcterms.identifier | https://ror.org/03yxnpp24 | |
dc.type.version | info:eu-repo/semantics/acceptedVersion | es |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | es |
dc.contributor.affiliation | Universidad de Sevilla. Departamento de Electrónica y Electromagnetismo | es |
dc.relation.projectID | P08-TIC-03674 | es |
dc.relation.projectID | EC/FP7/248858 | es |
dc.relation.projectID | TEC2008-04920 | es |
dc.relation.projectID | DPI2008-03847 | es |
dc.relation.publisherversion | https://doi.org/10.1109/ICM.2010.5696149 | es |
dc.identifier.doi | 10.1109/ICM.2010.5696149 | es |
idus.format.extent | 4 p. | es |
dc.publication.initialPage | 319 | es |
dc.publication.endPage | 322 | es |
dc.eventtitle | International Conference on Microelectronics | es |
dc.eventinstitution | El Cairo | es |