A Maiti, V Gunreddy, P Schaumont - Embedded systems design with …, 2013 - Springer
We propose a systematic method to evaluate and compare the performance of physical unclonable functions (PUFs). The need for such a method is justified by the fact that various …
In this paper we demonstrate the first real-world cloning attack on a commercial PUF-based RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol …
U Rührmair - Journal of Cryptographic Engineering, 2022 - Springer
Abstract “Classical keys,” ie, secret keys stored permanently in digital form in nonvolatile memory, appear indispensable in modern computer security—but also constitute an obvious …
Abstract Physically Unclonable Functions (PUFs) are an emerging technology and have been proposed as central building blocks in a variety of cryptographic protocols and security …
A Chen - IEEE Electron Device Letters, 2014 - ieeexplore.ieee.org
The stochastic switching mechanism and intrinsic variability of resistive random access memory (RRAM) present severe challenges for memory applications, which, however, may …
We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses generated from a Strong Physical Unclonable Function (PUF). The new method …
Y Lei, L Zeng, YX Li, MX Wang, H Qin - IEEE Access, 2021 - ieeexplore.ieee.org
The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the …
U Rührmair, DE Holcomb - 2014 Design, Automation & Test in …, 2014 - ieeexplore.ieee.org
Physical Unclonable Functions (PUFs) are a new, hardware-based security primitive, which has been introduced just about a decade ago. In this paper, we provide a brief and easily …