FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis

K Lata, LR Cenkeramaddi - Cryptography, 2023 - mdpi.com
Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic
platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic …

Thermal image encryption based on laser diode feedback and 2D logistic chaotic map

S Beg, F Baig, Y Hameed, A Anjum, A Khan - Multimedia Tools and …, 2022 - Springer
Importance of thermal images in an electric power station, nuclear plants, for extraction of
petroleum products, biological and medical is not unseen. Based on that, security of thermal …

Modelling of Random Number Generator based on PUFs and LFSR for secret key generation

R Krishnan, A Chalil - 2021 Second International Conference …, 2021 - ieeexplore.ieee.org
Random number generation give rise to a new set of random code or key in cryptography to
run a variety of unpredictable tasks such as secret key generation. In this paper an Arbiter …

An XOR-based pico-physically unclonable function for securing IoT devices

J Wang, J Liu, Z Huang, Q Wang - 2022 4th International …, 2022 - ieeexplore.ieee.org
Physically unclonable function (PUF) can be applied as a lightweight way to improve the
security of Internet of Thing (IoT) devices. In the existing PUF studies, reconfigurable Pico …

FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis

L Kusum, LR Cenkeramaddi - 2023 - uia.brage.unit.no
Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic
platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic …

Implementation of Arbiter Physical Unclonable Function on the Xilinx System on Chip FPGA

SK Kulkarni, RM Vani… - 2022 9th International …, 2022 - ieeexplore.ieee.org
In the Electronic industry, Internet of Things (IoT) design engineers face two significant
issues related to hardware security in embedded or IoT applications. The first issue is …

Authentication Algorithms modelling and Simulations of an Arbiter PUF

V Khan - 2023 - dspace.library.uvic.ca
Physical attacks represent a threat to intellectual property, confidential data, and service
security because they typically involve reading and modifying data. Attackers frequently …

Design and implementation of Strong Physical Unclonable Functions on Field Programmable Gate Array

S Kulkarni, RM Vani… - 2021 6th International …, 2021 - ieeexplore.ieee.org
Cryptography study provides confidentiality, availability, authentication, and integrity of
information by creating ciphers using a secret key. Such operations are possible unless and …