Arbiter puf—a review of design, composition, and security aspects

S Hemavathy, VSK Bhaaskaran - IEEE Access, 2023 - ieeexplore.ieee.org
Hardware security modules play a crucial role in protecting and preserving technologically
integrated systems that are used in daily life. They employ cryptographic protocols to secure …

[图书][B] Physically unclonable functions: Concept and constructions

R Maes, R Maes - 2013 - Springer
This chapter introduces the reader to the basic concept of a physically unclonable function
or PUF. Many research results on this topic were published over recent years in a variety of …

Architectures of flexible symmetric key crypto engines—a survey: From hardware coprocessor to multi-crypto-processor system on chip

L Bossuet, M Grand, L Gaspar, V Fischer… - ACM Computing …, 2013 - dl.acm.org
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines;
they must be carefully considered without reducing the major role of classical design …

PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon

S Katzenbeisser, Ü Kocabaş, V Rožić… - … and Embedded Systems …, 2012 - Springer
Abstract Physically Unclonable Functions (PUFs) are an emerging technology and have
been proposed as central building blocks in a variety of cryptographic protocols and security …

Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs

A Van Herrewege, S Katzenbeisser, R Maes… - … Cryptography and Data …, 2012 - Springer
RFID-based tokens are increasingly used in electronic payment and ticketing systems for
mutual authentication of tickets and terminals. These systems typically use cost-effective …

A formalization of the security features of physical functions

F Armknecht, R Maes, AR Sadeghi… - … IEEE symposium on …, 2011 - ieeexplore.ieee.org
Physical attacks against cryptographic devices typically take advantage of information
leakage (eg, side-channels attacks) or erroneous computations (eg, fault injection attacks) …

On design of a highly secure PUF based on non-linear current mirrors

R Kumar, W Burleson - … on hardware-oriented security and trust …, 2014 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) are lightweight hardware security primitives for
generating unique signatures from the unpredictable nature of silicon. However, most of the …

T2T-MAP: A PUF-based thing-to-thing mutual authentication protocol for IoT

K Lounis, M Zulkernine - IEEE Access, 2021 - ieeexplore.ieee.org
As security has always been an afterthought of innovation, the security of IoT (Internet of
Things), in general, and authentication, in particular, has become a serious research …

Cyber-physical systems: A security perspective

C Konstantinou, M Maniatakos, F Saqib… - 2015 20th IEEE …, 2015 - ieeexplore.ieee.org
A cyber-physical system (CPS) is a composition of independently interacting components,
including computational elements, communications and control systems. Applications of …

D2D-MAP: A drone to drone authentication protocol using physical unclonable functions

K Lounis, SHH Ding… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the continuous miniaturization of electronic devices and the recent advancements in
wireless communication technologies, Unmanned Aerial Vehicles (UAVs), in general, and …