FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures

NN Anandakumar, MS Hashmi, M Tehranipoor - Integration, 2021 - Elsevier
Abstract Physically Unclonable Functions (PUFs) are a promising technology and have
been proposed as central building blocks in many cryptographic protocols and security …

Arbiter puf—a review of design, composition, and security aspects

S Hemavathy, VSK Bhaaskaran - IEEE Access, 2023 - ieeexplore.ieee.org
Hardware security modules play a crucial role in protecting and preserving technologically
integrated systems that are used in daily life. They employ cryptographic protocols to secure …

CT PUF: Configurable tristate PUF against machine learning attacks for IoT security

J Zhang, C Shen, Z Guo, Q Wu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Physical unclonable function (PUF) is a promising lightweight hardware security primitive for
resource-limited Internet-of-Things (IoT) devices. Strong PUFs are suitable for lightweight …

Set-based obfuscation for strong PUFs against machine learning attacks

J Zhang, C Shen - IEEE transactions on circuits and systems I …, 2020 - ieeexplore.ieee.org
Strong physical unclonable function (PUF) is a promising solution for device authentication
in resource-constrained applications but vulnerable to machine learning (ML) attacks. In …

Flam-puf: A response–feedback-based lightweight anti-machine-learning-attack puf

L Wu, Y Hu, K Zhang, W Li, X Xu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) have been adopted in many resource-constrained
Internet of Things (IoT) applications to provide effective and lightweight solutions for device …

Scalable Photo-Responsive Physical Unclonable Functions via Particle Kinetics

U Jung, CJ Beak, K Kim, JH Na, SH Lee - ACS nano, 2024 - ACS Publications
The increasing menace of counterfeiting and information theft underscores the urgent need
for security platforms compatible with both micro-and nanoelectronics. Existing methods for …

Privacy-preserving authentication protocols for iot devices using the sirf puf

J Plusquellic, EE Tsiropoulou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Authentication between IoT devices is important for maintaining security, trust and data
integrity in an edge device ecosystem. The low-power, reduced computing capacity of the …

NoPUF: A novel PUF design framework toward modeling attack resistant PUFs

A Wang, W Tan, Y Wen, Y Lao - IEEE Transactions on Circuits …, 2021 - ieeexplore.ieee.org
With the rapid development and globalization of the semiconductor industry, hardware
security has emerged as a critical concern. New attacking and tampering methods are …

[HTML][HTML] A robust architecture of ring oscillator PUF: Enhancing cryptographic security with configurability

H Kareem, D Dunaev - Microelectronics Journal, 2024 - Elsevier
Abstract Physically Unclonable Functions (PUFs) are becoming more widely recognized as
tamper-resistant, high-entropy hardware security primitives. Leveraging the intrinsic …

Resilience evaluation of memristor based PUF against machine learning attacks

HM Ibrahim, H Skovorodnikov, H Alkhzaimi - Scientific reports, 2024 - nature.com
Physical unclonable functions (PUFs) have emerged as a favorable hardware security
primitive, they exploit the process variations to provide unique signatures or secret keys …