Nothing Special   »   [go: up one dir, main page]

Chen et al., 2012 - Google Patents

Characterization of the bistable ring PUF

Chen et al., 2012

View PDF
Document ID
9395734271302886302
Author
Chen Q
Csaba G
Lugli P
Schlichtmann U
Rührmair U
Publication year
Publication venue
2012 Design, Automation & Test in Europe Conference & Exhibition (DATE)

External Links

Snippet

The bistable ring physical (ly) unclonable function (BR-PUF) is a novel electrical intrinsic PUF design for physical cryptography. FPGA prototyping has provided a proof-of-concept, showing that the BR-PUF could be a promising candidate for strong PUFs. However, due to …
Continue reading at bia.unibz.it (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Similar Documents

Publication Publication Date Title
Chen et al. Characterization of the bistable ring PUF
Zhang et al. Voltage over-scaling-based lightweight authentication for IoT security
Chen et al. The bistable ring PUF: A new architecture for strong physical unclonable functions
CA2971212C (en) Reliability enhancement methods for physically unclonable function bitstring generation
Katzenbeisser et al. PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
Xu et al. Hybrid side-channel/machine-learning attacks on PUFs: A new threat?
Kumar et al. On design of a highly secure PUF based on non-linear current mirrors
Xu et al. Security of IoT systems: Design challenges and opportunities
Maes et al. Physically unclonable functions: Concept and constructions
Mispan et al. Cost-efficient design for modeling attacks resistant PUFs
Awano et al. Ising-PUF: A machine learning attack resistant PUF featuring lattice like arrangement of arbiter-PUFs
Mispan et al. Lightweight obfuscation techniques for modeling attacks resistant PUFs
Mathew et al. A novel memristor based physically unclonable function
Yu et al. Can deep learning break a true random number generator?
Zalivaka et al. Low-cost fortification of arbiter PUF against modeling attack
Mills et al. Design and evaluation of a delay-based FPGA physically unclonable function
Zalivaka et al. FPGA implementation of modeling attack resistant arbiter PUF with enhanced reliability
US11861050B2 (en) SR flip-flop based physical unclonable functions for hardware security
Spenke et al. An arbiter PUF secured by remote random reconfigurations of an FPGA
Thomas A detailed review on physical unclonable function circuits for hardware security
Wisiol et al. Why attackers lose: Design and security analysis of arbitrarily large XOR arbiter PUFs
Nguyen et al. Lightweight and secure PUFs: A survey
Noor et al. Defense mechanisms against machine learning modeling attacks on strong physical unclonable functions for iot authentication: a review
Alamro et al. Machine learning attack on a multiplexer PUF variant using silicon data: A case study on rMPUFs
Kulkarni et al. A study on physical unclonable functions based security for internet of things applications