Chen et al., 2012 - Google Patents
Characterization of the bistable ring PUFChen et al., 2012
View PDF- Document ID
- 9395734271302886302
- Author
- Chen Q
- Csaba G
- Lugli P
- Schlichtmann U
- Rührmair U
- Publication year
- Publication venue
- 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE)
External Links
Snippet
The bistable ring physical (ly) unclonable function (BR-PUF) is a novel electrical intrinsic PUF design for physical cryptography. FPGA prototyping has provided a proof-of-concept, showing that the BR-PUF could be a promising candidate for strong PUFs. However, due to …
- 238000010192 crystallographic characterization 0 title description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | Characterization of the bistable ring PUF | |
Zhang et al. | Voltage over-scaling-based lightweight authentication for IoT security | |
Chen et al. | The bistable ring PUF: A new architecture for strong physical unclonable functions | |
CA2971212C (en) | Reliability enhancement methods for physically unclonable function bitstring generation | |
Katzenbeisser et al. | PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon | |
Xu et al. | Hybrid side-channel/machine-learning attacks on PUFs: A new threat? | |
Kumar et al. | On design of a highly secure PUF based on non-linear current mirrors | |
Xu et al. | Security of IoT systems: Design challenges and opportunities | |
Maes et al. | Physically unclonable functions: Concept and constructions | |
Mispan et al. | Cost-efficient design for modeling attacks resistant PUFs | |
Awano et al. | Ising-PUF: A machine learning attack resistant PUF featuring lattice like arrangement of arbiter-PUFs | |
Mispan et al. | Lightweight obfuscation techniques for modeling attacks resistant PUFs | |
Mathew et al. | A novel memristor based physically unclonable function | |
Yu et al. | Can deep learning break a true random number generator? | |
Zalivaka et al. | Low-cost fortification of arbiter PUF against modeling attack | |
Mills et al. | Design and evaluation of a delay-based FPGA physically unclonable function | |
Zalivaka et al. | FPGA implementation of modeling attack resistant arbiter PUF with enhanced reliability | |
US11861050B2 (en) | SR flip-flop based physical unclonable functions for hardware security | |
Spenke et al. | An arbiter PUF secured by remote random reconfigurations of an FPGA | |
Thomas | A detailed review on physical unclonable function circuits for hardware security | |
Wisiol et al. | Why attackers lose: Design and security analysis of arbitrarily large XOR arbiter PUFs | |
Nguyen et al. | Lightweight and secure PUFs: A survey | |
Noor et al. | Defense mechanisms against machine learning modeling attacks on strong physical unclonable functions for iot authentication: a review | |
Alamro et al. | Machine learning attack on a multiplexer PUF variant using silicon data: A case study on rMPUFs | |
Kulkarni et al. | A study on physical unclonable functions based security for internet of things applications |