R Maes, V Van Der Leest, E Van Der Sluis… - … and Embedded Systems …, 2015 - Springer
PUF-based key generators have been widely considered as a root-of-trust in digital systems. They typically require an error-correcting mechanism (eg based on the code-offset method) …
R Maes, V van der Leest, E van der Sluis… - Journal of Cryptographic …, 2016 - Springer
When the applied PUF in a PUF-based key generator does not produce full entropy responses, information about the derived key material is leaked by code-offset helper data. If …
MA Usmani, S Keshavarz, E Matthews… - … Transactions on very …, 2018 - ieeexplore.ieee.org
Reconfigurable systems often require secret keys to encrypt and decrypt data. Applications requiring high security commonly generate keys based on physical unclonable functions …
P Koeberl, J Li, A Rajan, W Wu - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
One of the promising usages of Physically Unclonable Functions (PUFs) is to generate cryptographic keys from PUFs for secure storage of key material. This usage has attractive …
Secure storage of cryptographic keys in hardware is an essential building block for high security applications. It has been demonstrated that Physically Unclonable Functions (PUFs) …
In this paper, we present a novel ultra-compact Physical Unclonable Function (PUF) architecture and its FPGA implementation. The proposed Delay Difference PUF (DD-PUF) is …
Abstract Physical Unclonable Functions (PUFs) have established themselves in the scientific literature, and are also gaining ground in commercial applications. Recently, however …
Physical unclonable functions (PUFs) have not only been suggested as a new key storage mechanism, but—in the form of so-called strong PUFs—also as cryptographic primitives in …
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such as sensors nodes and actuators, which are linked to the Internet. By 2020 it is …