The device-unique response of a physically unclonable function (PUF) can serve as the root of trust in an embedded cryptographic system. Fuzzy extractors transform this noisy non …
S Chen, B Li, C Zhou - Microprocessors and Microsystems, 2018 - Elsevier
The security of cryptographic protocols depends on the security of key sequences consisting of random numbers. In this paper, we design a Cryptographically Secure Pseudo-Random …
H Liu, W Liu, Z Lu, Q Tong, Z Liu - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
For cryptographic applications based on physical unclonable functions (PUFs), it is very important to estimate the entropy of PUF responses accurately. The upper bound of the …
Y Gao, Y Su, S Nepal… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Building hardware security primitives with on-device memory fingerprints is a compelling proposition given the ubiquity of memory in electronic devices, especially for low-end …
M Gong, H Zhang, C Wang, Q Tong, Z Liu - Microelectronics Journal, 2020 - Elsevier
The robustness of Static random access memory (SRAM) Physical unclonable functions (PUFs) is threatened by the state change of the power-up value (R) at different temperatures …
F Gondesen, S Mitra, KY Lam - Proceedings of the 6th ACM on Cyber …, 2020 - dl.acm.org
With the proliferation of connected IoT devices over the last decade, security has become one of the most pronounced areas of technical concern. Furthermore, the most important …
M Gong, H Liu, R Min, Z Liu - Sensors, 2018 - mdpi.com
Static Random Access Memory (SRAM) Physical Unclonable Functions (PUFs) are some of the most popular PUFs that provide a highly-secured solution for secret key storage. Given …
A Kumar, RS Mishra… - … Conference on Advances …, 2016 - ieeexplore.ieee.org
Cryptography looks forward to generate secrete key from integrated circuit. A silicon based device having uncontrollable feature in term of measurable output can turned into physically …