Physical unclonable functions (PUF) for IoT devices

A Al-Meer, S Al-Kuwari - ACM Computing Surveys, 2023 - dl.acm.org
Physical Unclonable Function (PUF) has recently attracted interest from both industry and
academia as a potential alternative approach to secure Internet of Things (IoT) devices from …

The odyssey of entropy: cryptography

B Zolfaghari, K Bibak, T Koshiba - Entropy, 2022 - mdpi.com
After being introduced by Shannon as a measure of disorder and unavailable information,
the notion of entropy has found its applications in a broad range of scientific disciplines. In …

SRAM-PUF-based entities authentication scheme for resource-constrained IoT devices

F Farha, H Ning, K Ali, L Chen… - IEEE internet of things …, 2020 - ieeexplore.ieee.org
With the development of the cloud-based Internet of Things (IoT), people and things can
request services, access data, or control actuators located thousands of miles away. The …

Secure-iGLU: A secure device for noninvasive glucose measurement and automatic insulin delivery in IoMT framework

AM Joshi, P Jain, SP Mohanty - 2020 IEEE Computer Society …, 2020 - ieeexplore.ieee.org
The growth of healthcare technologies has made a great impact on human life for the last
few years. Various innovations in implantable and wearable medical devices improve the …

Radio Frequency Fingerprints vs. Physical Unclonable Functions-Are They Twins, Competitors, or Allies?

J Zhang, CH Chang, C Gu, L Hanzo - IEEE Network, 2022 - ieeexplore.ieee.org
Privacy breaches and online frauds are grave concerns in pervasive computing. Device
identification is the first line of defense to detect and stop fraud. Conventional device …

[图书][B] Crypto and AI: From Coevolution to Quantum Revolution

B Zolfaghari, HR Nemati, N Yanai, K Bibak - 2023 - Springer
This book studies the intersection between cryptography and AI, highlighting the significant
cross-impact and potential between the two technologies. The authors first study the …

Information-Theoretic Cryptography: Life Cycle, Ecosystem, and the Promise of Quantum-Inspired AI

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
After being introduced by Shannon as a measure of disorder and unavailable information,
the notion of entropy has found its applications in a broad range of scientific disciplines. In …

Novel Architecture for Authentication-based Reliable Hardware Security Model

J Pathak, SL Tripathi - Advances in Data and Information Sciences …, 2022 - Springer
Classically, VLSI IC is characterized by area, power, and delay, but the present situation
makes security the fourth factor. Whether IC used is an authenticated one or not? Whether IC …

Estimating the Unpredictability of Multi-Bit Strong PUF Classes

A Bendary, WAS Barbosa, A Pomerance… - Cryptology ePrint …, 2024 - eprint.iacr.org
With the ongoing advances in machine learning (ML), cybersecurity solutions and security
primitives are becoming increasingly vulnerable to successful attacks. Strong physically …

Frequency-Based RO-PUF

A Kumar, J Pathak, SL Tripathi - AI Techniques for Reliability …, 2020 - igi-global.com
Abstract Arbiter PUF and RO-PUF are two well-known architectures. Arbiter PUF is a simple
architecture and easy to implement while RO-PUF require exponentially large hardware. As …