Skip to main content
  • Book
  • © 2010

Towards Hardware-Intrinsic Security

Foundations and Practice

  • First book on this topic
  • Contains important background material for students and practitioners
  • Many contributions from interdisciplinary teams
  • Includes supplementary material: sn.pub/extras

Part of the book series: Information Security and Cryptography (ISC)

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 chapters)

  1. Front Matter

    Pages i-xvi
  2. Physically Unclonable Functions (PUFs)

    1. Front Matter

      Pages 1-1
    2. Hardware Intrinsic Security from Physically Unclonable Functions

      • Helena Handschuh, Geert-Jan Schrijen, Pim Tuyls
      Pages 39-53
    3. From Statistics to Circuits: Foundations for Future Physical Unclonable Functions

      • Inyoung Kim, Abhranil Maiti, Leyla Nazhandali, Patrick Schaumont, Vignesh Vivekraja, Huaiye Zhang
      Pages 55-78
    4. Strong PUFs: Models, Constructions, and Security Proofs

      • Ulrich Rührmair, Heike Busch, Stefan Katzenbeisser
      Pages 79-96
  3. Hardware-based Cryptography

    1. Front Matter

      Pages 97-97
    2. Leakage Resilient Cryptography in Practice

      • François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald
      Pages 99-134
    3. Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions

      • Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls
      Pages 135-164
  4. Hardware Attacks

    1. Front Matter

      Pages 165-165
    2. Hardware Trojan Horses

      • Mohammad Tehranipoor, Berk Sunar
      Pages 167-187
    3. Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning No Results

      • Yoo-Jin Baek, Vanessa Gratzer, Sung-Hyun Kim, David Naccache
      Pages 189-197
  5. Hardware-based Policy Enforcement

    1. Front Matter

      Pages 199-199
    2. License Distribution Protocols from Optical Media Fingerprints

      • Ghaith Hammouri, Aykutlu Dana, Berk Sunar
      Pages 201-222
  6. Hardware-Security in Contactless Tokens

    1. Front Matter

      Pages 235-235
    2. Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware

      • Yong Ki Lee, Lejla Batina, Dave Singelee, Bart Preneel, Ingrid Verbauwhede
      Pages 237-257
    3. Enhancing RFID Security and Privacy by Physically Unclonable Functions

      • Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
      Pages 281-305
  7. Hardware-based Security Architectures and Applications

    1. Front Matter

      Pages 307-307

About this book

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security for RFID systems and the necessary accompanying system architectures. This book brings together contributions from researchers and practitioners in academia and industry, an interdisciplinary group with backgrounds in physics, mathematics, cryptography, coding theory and processor theory. It will serve as important background material for students and practitioners, and will stimulate much further research and development.

Reviews

"This book will prove to be very interesting for professionals in the hardware security field. It covers almost every aspect of this area, with excellent papers written by experts." Javier Castillo, ACM Computing Reviews, June 2011

Editors and Affiliations

  • Horst Görtz Institut für, Sicherheit in der, Universität Bochum, Bochum, Germany

    Ahmad-Reza Sadeghi

  • Département d'informatique, Groupe de cryptographie, École normale supérieure, Paris, France

    David Naccache

Bibliographic Information

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access