Abstract Physically Unclonable Functions (PUFs) are a promising technology and have been proposed as central building blocks in many cryptographic protocols and security …
We discuss numerical modeling attacks on several proposed strong physical unclonable functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal …
This chapter introduces the reader to the basic concept of a physically unclonable function or PUF. Many research results on this topic were published over recent years in a variety of …
A Maiti, V Gunreddy, P Schaumont - Embedded systems design with …, 2013 - Springer
We propose a systematic method to evaluate and compare the performance of physical unclonable functions (PUFs). The need for such a method is justified by the fact that various …
In this paper, we analyze ring oscillator (RO) based physical unclonable function (PUF) on FPGAs. We show that the systematic process variation adversely affects the ability of the RO …
Counterfeit integrated circuits (ICs) pose a major concern to the industry and government as they potentially impact the security and reliability of a wide variety of electronic systems. A …
Robustness to modeling attacks is an important requirement for PUF circuits. Several reported Arbiter PUF com-positions have resisted modeling attacks. and often require huge …
Arbiter Physically Unclonable Functions (APUFs), while being relatively lightweight, are extremely vulnerable to modeling attacks. Hence, various compositions of APUFs such as …
This paper proposes a novel approach for efficient implementation of a real-valued arbiter- based physical unclon-able function (PUF) on FPGA. We introduce a high resolution …