Results 41 to 50 of about 8,100 (211)

Reconfigurable Security Architecture (RESA) Based on PUF for FPGA-Based IoT Devices

open access: yesSensors, 2022
Cybersecurity is a challenge in the utilization of IoT devices. One of the main security functions that we need for IoT devices is authentication. In this work, we used physical unclonable function (PUF) technology to propose a lightweight authentication
Armin Babaei   +2 more
doaj   +1 more source

A formal definition and a new security mechanism of physical unclonable functions

open access: yes, 2012
The characteristic novelty of what is generally meant by a "physical unclonable function" (PUF) is precisely defined, in order to supply a firm basis for security evaluations and the proposal of new security mechanisms.
D. Lim   +5 more
core   +1 more source

RRAM Based Random Bit Generation for Hardware Security Applications [PDF]

open access: yes, 2016
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new
Arumi Delgado, Daniel   +3 more
core   +1 more source

A New Reconfigurable True Random Number Generator and Physical Unclonable Function Unified Chip With On-Chip Auto-Calibration

open access: yesIEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2023
True random number generator (TRNG) and physical unclonable function (PUF) have been extensively used to secure low-cost Internet of Things (IoT) endpoints.
Yuan Cao   +6 more
semanticscholar   +1 more source

A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks

open access: yesSensors, 2018
Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open ...
Yuan Cao   +4 more
doaj   +1 more source

Quantum cloning attacks against PUF-based quantum authentication systems

open access: yes, 2016
With the advent of Physical Unclonable Functions (PUFs), PUF-based quantum authentication systems (QAS) have been proposed for security purposes and recently proof-of-principle experiment has been demonstrated.
Gao, Ming, Li, Mo, Yao, Yao, Zhang, Jian
core   +1 more source

Improved Reliability of FPGA-based PUF Identification Generator Design [PDF]

open access: yes, 2017
Physical unclonable functions (PUFs), a form of physical security primitive, enable digital identifiers to be extracted from devices, such as field programmable gate arrays (FPGAs).
Gu, Chongyan   +2 more
core   +1 more source

Unpredictable bits generation based on RRAM parallel configuration [PDF]

open access: yes, 2018
In this letter a cell with the parallel combination of two TiN/Ti/HfO2/W resistive random access memory (RRAM) devices is studied for the generation of unpredictable bits.
Arumi Delgado, Daniel   +5 more
core   +2 more sources

Design Impedance Mismatch Physical Unclonable Functions for IoT Security

open access: yesActive and Passive Electronic Components, 2017
We propose a new design, Physical Unclonable Function (PUF) scheme, for the Internet of Things (IoT), which has been suffering from multiple-level security threats. As more and more objects interconnect on IoT networks, the identity of each thing is very
Xiaomin Zheng   +3 more
doaj   +1 more source

Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions

open access: yes, 2014
We introduce the class of multiply constant-weight codes to improve the reliability of certain physically unclonable function (PUF) response. We extend classical coding methods to construct multiply constant-weight codes from known $q$-ary and constant ...
Chee, Yeow Meng   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy