Hardware-based cryptography that exploits physical unclonable functions is required for the secure identification and authentication of devices in the Internet of Things. However …
Y Cao, W Liu, L Qin, B Liu, S Chen, J Ye, X Xia… - Entropy, 2022 - mdpi.com
Entropy is a measure of uncertainty or randomness. It is the foundation for almost all cryptographic systems. True random number generators (TRNGs) and physical unclonable …
This chapter introduces the reader to the basic concept of a physically unclonable function or PUF. Many research results on this topic were published over recent years in a variety of …
A Maiti, V Gunreddy, P Schaumont - Embedded systems design with …, 2013 - Springer
We propose a systematic method to evaluate and compare the performance of physical unclonable functions (PUFs). The need for such a method is justified by the fact that various …
In this paper we demonstrate the first real-world cloning attack on a commercial PUF-based RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol …
We present PUFKY: a practical and modular design for a cryptographic key generator based on a Physically Unclonable Function (PUF). A fully functional reference implementation is …
In this paper, we analyze ring oscillator (RO) based physical unclonable function (PUF) on FPGAs. We show that the systematic process variation adversely affects the ability of the RO …
Abstract Physically Unclonable Functions (PUFs) are an emerging technology and have been proposed as central building blocks in a variety of cryptographic protocols and security …
Y Hori, T Yoshida, T Katashita… - … computing and FPGAs, 2010 - ieeexplore.ieee.org
The quantitative performance indicators of Physical Unclonable Functions (PUFs)- Randomness, Steadiness, Correctness, Diffuseness and Uniqueness-are strictly defined …