Results 51 to 60 of about 4,527 (172)

Leveraging Distributions in Physical Unclonable Functions

open access: yesCryptography, 2017
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in novel hardware-based authentication protocols. Strong PUFs are required for authentication because the bit strings and helper data are transmitted openly by
Wenjie Che   +3 more
doaj   +1 more source

Controllable Identifier Measurements for Private Authentication with Secret Keys

open access: yes, 2018
The problem of secret-key based authentication under a privacy constraint on the source sequence is considered. The identifier measurements during authentication are assumed to be controllable via a cost-constrained "action" sequence.
Caire, Giuseppe   +3 more
core   +1 more source

Ultra‐Durable Information‐Encoded Anti‐Counterfeiting Self‐Assembled Nanocrystal Labels

open access: yesAdvanced Optical Materials, EarlyView.
Ultra‐durable cost‐effective information‐encoded anti‐counterfeiting labels are fabricated to secure semiconductor chips. A novel method is used to self‐assemble colloidal quantum wells (CQWs) into color bars. Information can be encoded spatially, spectrally, and opto‐spatially.
Taha Haddadifam   +6 more
wiley   +1 more source

Phase Calibrated Ring Oscillator PUF Design and Application

open access: yesComputers, 2018
A Ring Oscillator Physical Unclonable Function (RO PUF) is an application-constrained hardware security primitive that can be used for authentication and key generation.
Wei Yan, John Chandy
doaj   +1 more source

RRAM Variability Harvesting for CIM‐Integrated TRNG

open access: yesAdvanced Electronic Materials, EarlyView.
This work demonstrates a compute‐in‐memory‐compatible true random number generator that harvests intrinsic cycle‐to‐cycle variability from a 1T1R RRAM array. Parallel entropy extraction enables high‐throughput bit generation without dedicated circuits. This approach achieves NIST‐compliant randomness and low per‐bit energy, offering a scalable hardware
Ankit Bende   +4 more
wiley   +1 more source

Authentication of IC based on Electromagnetic Signature [PDF]

open access: yes, 2016
IC Counterfeiting is becoming serious issue. The approach discussed here is to use Electromagnetic (EM) input to an IC and measure its EM input output response. The idea is to extract a signature from EM response which should be unique to one IC. The
Ahmed, Mosabbah Mushir   +4 more
core  

Energy efficient mining on a quantum-enabled blockchain using light

open access: yes, 2012
We outline a quantum-enabled blockchain architecture based on a consortium of quantum servers. The network is hybridised, utilising digital systems for sharing and processing classical information combined with a fibre--optic infrastructure and quantum ...
Bennet, Adam J, Daryanoosh, Shakib
core   +1 more source

Modeling attacks on physical unclonable functions [PDF]

open access: yesProceedings of the 17th ACM conference on Computer and communications security, 2010
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs.
Ulrich, Ruhrmair   +5 more
openaire   +4 more sources

Dual Entropy Source Physical Unclonable Functions of Reconfigurable Feedback Field‐Effect Transistors with Polycrystalline Silicon Channels

open access: yesAdvanced Intelligent Systems, EarlyView.
Physically unclonable functions (PUFs) of reconfigurable feedback field‐effect transistors (R‐FBFETs) with polycrystalline silicon channels are designed for dual entropy sources. The uniqueness and reliability of the dual entropy source PUF are verified by inter‐ and intra‐Hamming distances of 49.13% and 3.47%, respectively, as well as NIST statistical
Taeho Park   +4 more
wiley   +1 more source

Chemical unclonable functions based on operable random DNA pools

open access: yesNature Communications
Physical unclonable functions (PUFs) based on unique tokens generated by random manufacturing processes have been proposed as an alternative to mathematical one-way algorithms.
Anne M. Luescher   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy