[图书][B] Physically unclonable functions: Concept and constructions

R Maes, R Maes - 2013 - Springer
This chapter introduces the reader to the basic concept of a physically unclonable function
or PUF. Many research results on this topic were published over recent years in a variety of …

A systematic method to evaluate and compare the performance of physical unclonable functions

A Maiti, V Gunreddy, P Schaumont - Embedded systems design with …, 2013 - Springer
We propose a systematic method to evaluate and compare the performance of physical
unclonable functions (PUFs). The need for such a method is justified by the fact that various …

The gap between promise and reality: On the insecurity of XOR arbiter PUFs

GT Becker - … Hardware and Embedded Systems--CHES 2015: 17th …, 2015 - Springer
In this paper we demonstrate the first real-world cloning attack on a commercial PUF-based
RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol …

Secret-free security: A survey and tutorial

U Rührmair - Journal of Cryptographic Engineering, 2022 - Springer
Abstract “Classical keys,” ie, secret keys stored permanently in digital form in nonvolatile
memory, appear indispensable in modern computer security—but also constitute an obvious …

PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon

S Katzenbeisser, Ü Kocabaş, V Rožić… - … and Embedded Systems …, 2012 - Springer
Abstract Physically Unclonable Functions (PUFs) are an emerging technology and have
been proposed as central building blocks in a variety of cryptographic protocols and security …

Utilizing the variability of resistive random access memory to implement reconfigurable physical unclonable functions

A Chen - IEEE Electron Device Letters, 2014 - ieeexplore.ieee.org
The stochastic switching mechanism and intrinsic variability of resistive random access
memory (RRAM) present severe challenges for memory applications, which, however, may …

Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching

M Majzoobi, M Rostami, F Koushanfar… - … IEEE Symposium on …, 2012 - ieeexplore.ieee.org
We introduce Slender PUF protocol, an efficient and secure method to authenticate the
responses generated from a Strong Physical Unclonable Function (PUF). The new method …

A lightweight authentication protocol for UAV networks based on security and computational resource optimization

Y Lei, L Zeng, YX Li, MX Wang, H Qin - IEEE Access, 2021 - ieeexplore.ieee.org
The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and
computing resource application efficiency of UAV a hot topic in the security field of the …

PUFs at a glance

U Rührmair, DE Holcomb - 2014 Design, Automation & Test in …, 2014 - ieeexplore.ieee.org
Physical Unclonable Functions (PUFs) are a new, hardware-based security primitive, which
has been introduced just about a decade ago. In this paper, we provide a brief and easily …

High-fidelity spherical cholesteric liquid crystal Bragg reflectors generating unclonable patterns for secure authentication

Y Geng, JH Noh, I Drevensek-Olenik, R Rupp… - Scientific reports, 2016 - nature.com
Monodisperse cholesteric liquid crystal microspheres exhibit spherically symmetric Bragg
reflection, generating, via photonic cross communication, dynamically tuneable multi …