This chapter introduces the reader to the basic concept of a physically unclonable function or PUF. Many research results on this topic were published over recent years in a variety of …
L Bossuet, M Grand, L Gaspar, V Fischer… - ACM Computing …, 2013 - dl.acm.org
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they must be carefully considered without reducing the major role of classical design …
Abstract Physically Unclonable Functions (PUFs) are an emerging technology and have been proposed as central building blocks in a variety of cryptographic protocols and security …
RFID-based tokens are increasingly used in electronic payment and ticketing systems for mutual authentication of tickets and terminals. These systems typically use cost-effective …
F Armknecht, R Maes, AR Sadeghi… - … IEEE symposium on …, 2011 - ieeexplore.ieee.org
Physical attacks against cryptographic devices typically take advantage of information leakage (eg, side-channels attacks) or erroneous computations (eg, fault injection attacks) …
R Kumar, W Burleson - … on hardware-oriented security and trust …, 2014 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) are lightweight hardware security primitives for generating unique signatures from the unpredictable nature of silicon. However, most of the …
As security has always been an afterthought of innovation, the security of IoT (Internet of Things), in general, and authentication, in particular, has become a serious research …
A cyber-physical system (CPS) is a composition of independently interacting components, including computational elements, communications and control systems. Applications of …
K Lounis, SHH Ding… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the continuous miniaturization of electronic devices and the recent advancements in wireless communication technologies, Unmanned Aerial Vehicles (UAVs), in general, and …