R Maes, I Verbauwhede - Towards Hardware-Intrinsic Security …, 2010 - Springer
The idea of using intrinsic random physical features to identify objects, systems, and people is not new. Fingerprint identification of humans dates at least back to the nineteenth century …
U Guin, K Huang, D DiMase, JM Carulli… - Proceedings of the …, 2014 - ieeexplore.ieee.org
As the electronic component supply chain grows more complex due to globalization, with parts coming from a diverse set of suppliers, counterfeit electronics have become a major …
This chapter introduces the reader to the basic concept of a physically unclonable function or PUF. Many research results on this topic were published over recent years in a variety of …
Abstract Physically Unclonable Functions (PUFs) are an emerging technology and have been proposed as central building blocks in a variety of cryptographic protocols and security …
P Tuyls, GJ Schrijen, B Škorić, J Van Geloven… - … and Embedded Systems …, 2006 - Springer
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient because …
Counterfeit integrated circuits (ICs) pose a major concern to the industry and government as they potentially impact the security and reliability of a wide variety of electronic systems. A …
Y Hori, T Yoshida, T Katashita… - … computing and FPGAs, 2010 - ieeexplore.ieee.org
The quantitative performance indicators of Physical Unclonable Functions (PUFs)- Randomness, Steadiness, Correctness, Diffuseness and Uniqueness-are strictly defined …
The goal of physical layer security (PLS) is to make use of the properties of the physical layer—including the wireless communication medium and/or the transceiver hardware—to …
Identification, authentication, and integrity checking are important tasks for ensuring the security and protection of valuable objects, devices, programs, and data. The utilization of …