CBDC-PUF: a novel physical unclonable function design framework utilizing configurable butterfly delay chain against modeling attack

Y Liu, J Li, T Qu, Z Dai - ACM Transactions on Design Automation of …, 2023 - dl.acm.org
Physical unclonable function (PUF) is a promising security-based primitive, which provides
an extremely large number of responses for key generation and authentication applications …

Lightweight hardware based secure authentication scheme for fog computing

B Huang, X Cheng, Y Cao… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
Fog computing is a new paradigm that extends cloud computing to the network edges. As
data processing, communications, and control are performed more closely to the end-user …

Intrusion Detection and Obfuscation Mechanism for PUF-Based Authentication

SJ Wang, KSM Li, CY Lin… - 2022 IEEE 31st Asian Test …, 2022 - ieeexplore.ieee.org
Physical Unclonable Functions (PUF) provide a lightweight secure primitive. However, it is
well known that PUFs are vulnerable to machine learning based modeling attacks (MA). A …

Converting unstable challenges to stable in MUX-based physical unclonable functions by bit-flipping

A Koyily, KK Parhi - 2019 53rd Asilomar Conference on Signals …, 2019 - ieeexplore.ieee.org
Linear and nonlinear multiplexer based physical unclonable functions (MUX PUFs) are used
for authentication of devices. The responses to some input challenges can be unreliable or …

A study on modeling of MUX-based physical unclonable functions

A Koyily - 2018 - search.proquest.com
Abstract Physical Unclonable Functions (PUFs) are simple circuits that are ideal for
hardware security. Typically, they are used for identifying and authenticating integrated …