Protocol attacks on advanced PUF protocols and countermeasures.
Marten van DijkUlrich RührmairPublished in: DATE (2014)
Keyphrases
- countermeasures
- cryptographic protocols
- security protocols
- network protocols
- information security
- authentication protocol
- communication protocol
- communication protocols
- multi party non repudiation
- key distribution
- voting protocols
- fair exchange protocols
- key agreement protocol
- transaction processing systems
- protocol specification
- java card
- power analysis
- security properties
- cyber attacks
- smart card
- messages exchanged
- security measures
- electronic devices
- concurrency control protocols
- lightweight
- security breaches
- correctness criteria
- databases
- knowledge discovery