Physical unclonable functions and applications: A tutorial C Herder, MD Yu, F Koushanfar, S Devadas Proceedings of the IEEE 102 (8), 1126-1141, 2014 | 1474 | 2014 |
Secure and robust error correction for physical unclonable functions MD Yu, S Devadas IEEE Design & Test of Computers 27 (1), 48-65, 2010 | 491 | 2010 |
A lockdown technique to prevent machine learning on PUFs for lightweight authentication MD Yu, M Hiller, J Delvaux, R Sowell, S Devadas, I Verbauwhede IEEE Transactions on Multi-Scale Computing Systems 2 (3), 146-159, 2016 | 232 | 2016 |
Lightweight and secure PUF key storage using limits of machine learning MDM Yu, D M’Raihi, R Sowell, S Devadas International Workshop on Cryptographic Hardware and Embedded Systems, 358-373, 2011 | 126 | 2011 |
Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions C Herder, L Ren, M van Dijk, MD Yu, S Devadas IEEE Transactions on Dependable and Secure Computing 14 (1), 65-82, 2017 | 120 | 2017 |
Performance metrics and empirical results of a PUF cryptographic key generation ASIC MD Yu, R Sowell, A Singh, D M'Raïhi, S Devadas Hardware-Oriented Security and Trust (HOST), 2012 IEEE International …, 2012 | 113 | 2012 |
Efficient image scaling for scan rate conversion D Auld, GK Yeh, P Trajmar, CD Chang, MD Yu US Patent 6,327,000, 2001 | 111 | 2001 |
Efficient fuzzy extraction of PUF-induced secrets: Theory and applications J Delvaux, D Gu, I Verbauwhede, M Hiller, MDM Yu International Conference on Cryptographic Hardware and Embedded Systems, 412-431, 2016 | 107 | 2016 |
A noise bifurcation architecture for linear additive physical functions MD Yu, D M'Raïhi, I Verbauwhede, S Devadas 2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014 | 98 | 2014 |
Recombination of physical unclonable functions MDM Yu, S Devadas United States. Dept. of Defense, 2010 | 54 | 2010 |
Cherry-picking reliable PUF bits with differential sequence coding M Hiller, MD Yu, G Sigl IEEE Transactions on Information Forensics and Security 11 (9), 2065-2076, 2016 | 50 | 2016 |
Cryptographic security using fuzzy credentials for device and server communications MD Yu, S Devadas, D M'raihi, E Duprat US Patent 8,762,723, 2014 | 44 | 2014 |
Cryptographic security using fuzzy credentials for device and server communications MD Yu, S Devadas, D M'raihi, E Duprat US Patent App. 13/543,295, 2013 | 44 | 2013 |
Combination of values from a pseudo-random source MD Yu US Patent 8,468,186, 2013 | 43 | 2013 |
Combination of values from a pseudo-random source MD Yu US Patent App. 12/850,849, 2011 | 43 | 2011 |
Method and apparatus for processing video and graphics data to create a composite output image having independent and separate layers of video and graphics GK Yeh, CD Chang, MDM Yu US Patent 7,623,140, 2009 | 32 | 2009 |
Systematic low leakage coding for physical unclonable functions M Hiller, MDM Yu, M Pehl Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 25 | 2015 |
Maximum-likelihood decoding of device-specific multi-bit symbols for reliable key generation MD Yu, M Hiller, S Devadas Hardware Oriented Security and Trust (HOST), 2015 IEEE International …, 2015 | 23 | 2015 |
Index-based coding with a pseudo-random source MD Yu, S Devadas US Patent 8,811,615, 2014 | 19 | 2014 |
Index-based coding with a pseudo-random source MD Yu, S Devadas US Patent App. 12/850,693, 2011 | 19 | 2011 |