Xu et al., 2024 - Google Patents
Security Evaluation of Feed-Forward Interpose PUF Against Modelling AttacksXu et al., 2024
- Document ID
- 16461131934803917622
- Author
- Xu W
- Pang L
- Tang Y
- Chen M
- Publication year
- Publication venue
- 2024 IEEE 4th International Conference on Power, Electronics and Computer Applications (ICPECA)
External Links
Snippet
Physical unclonable function (PUF) is a lightweight hardware-safe circuit structure for Internet of Things (IoT). The susceptibility to neural network modeling attacks stands out as a critical consideration in the design of PUF structures. Interpose PUF (IPUF) is a PUF variant …
- 238000011156 evaluation 0 title description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Voltage over-scaling-based lightweight authentication for IoT security | |
Yang et al. | Hardware designs for security in ultra-low-power IoT systems: An overview and survey | |
Beckmann et al. | Hardware-based public-key cryptography with public physically unclonable functions | |
Shi et al. | Approximation attacks on strong PUFs | |
Sahoo et al. | A multiplexer-based arbiter PUF composition with enhanced reliability and security | |
Mahmoud et al. | Combined modeling and side channel attacks on strong PUFs | |
Sahoo et al. | A case of lightweight PUF constructions: Cryptanalysis and machine learning attacks | |
Potkonjak et al. | Public physical unclonable functions | |
Chen et al. | Characterization of the bistable ring PUF | |
Aghaie et al. | TI-PUF: Toward side-channel resistant physical unclonable functions | |
Wu et al. | Flam-puf: A response–feedback-based lightweight anti-machine-learning-attack puf | |
Hemavathy et al. | Arbiter puf—a review of design, composition, and security aspects | |
Chatterjee et al. | Theory and application of delay constraints in arbiter PUF | |
Mispan et al. | Cost-efficient design for modeling attacks resistant PUFs | |
Baek et al. | A reconfigurable SRAM based CMOS PUF with challenge to response pairs | |
Anandakumar et al. | Implementation of efficient XOR arbiter PUF on FPGA with enhanced uniqueness and security | |
Wang et al. | A dynamically configurable PUF and dynamic matching authentication protocol | |
Mills et al. | Design and evaluation of a delay-based FPGA physically unclonable function | |
Lai et al. | A robust area-efficient physically unclonable function with high machine learning attack resilience in 28-nm CMOS | |
Hou et al. | A dynamically configurable LFSR-based PUF design against machine learning attacks | |
Mispan et al. | Lightweight obfuscation techniques for modeling attacks resistant PUFs | |
Cui et al. | An efficient ring oscillator PUF using programmable delay units on FPGA | |
Williams et al. | Mc-PUF: Memory-based and machine learning resilient strong PUF for device authentication in Internet of Things | |
Ma et al. | Machine learning attacks resistant strong PUF design utilizing response obfuscates challenge with lower hardware overhead | |
KR20220041048A (en) | Systems and methods for using hybrid boolean networks as functions that cannot be physically replicated |