Hardware intrinsic security from physically unclonable functions

45Citations
Citations of this article
47Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Counterfeiting of goods in general and of electronic goods in particular is a growing concern with a huge impact on the global economy, the society, and the security of its critical infrastructure. Various examples are known where companies suffer from economic and brand damage due to competition with counterfeit goods. In some cases the use of counterfeit components has even led to tragic accidents in which lives were lost. It has also recently become clear that counterfeit products can penetrate the critical and security infrastructure of our modern societies and hence cause a threat to national security.

Cite

CITATION STYLE

APA

Handschuh, H., Schrijen, G. J., & Tuyls, P. (2010). Hardware intrinsic security from physically unclonable functions. In Information Security and Cryptography (Vol. 0, pp. 39–53). Springer International Publishing. https://doi.org/10.1007/978-3-642-14452-3_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free