Results 61 to 70 of about 8,100 (211)
Leveraging Distributions in Physical Unclonable Functions
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in novel hardware-based authentication protocols. Strong PUFs are required for authentication because the bit strings and helper data are transmitted openly by
Wenjie Che +3 more
doaj +1 more source
Extended Abstract: Analysis of 1000 Arbiter PUF based RFID Tags [PDF]
In this extended abstract a large-scale analysis of 4- way Arbiter PUFs is performed with measurement results from 1000 RFID tags. Arbiter PUFs are one of the most important building blocks in PUF-based protocols and have been the subject of many ...
Becker, Georg T. +2 more
core
Recent Advances on Thermochromic Inks for Security Applications
Thermochromic security inks have garnered interest in recent years as security elements for authentication, information encryption, and anti‐counterfeiting. This review outlines different types of thermochromic materials, how they have been developed as functional inks, and how advancements in property enhancement, sustainability, and printing ...
Duarte B. Oliveira +5 more
wiley +1 more source
A 2 Bit/Cell Tilting SRAM-Based PUF With a BER of 3.1E-10 and an Energy of 21 FJ/Bit in 65nm
An SRAM-based Physical Unclonable Function (PUF) with two independent bits/cells is presented along with a tilting preselection test designed to identify all the unstable bits.
Yizhak Shifman +3 more
doaj +1 more source
X-Point PUF: Exploiting Sneak Paths for a Strong Physical Unclonable Function Design
This paper presents a design of strong physical unclonable function (PUF) exploiting the sneak paths in the resistive X-point array. The entanglement of the sneak paths in the X-point array greatly enhances the entropy of the physical system, thereby ...
Rui Liu +3 more
semanticscholar +1 more source
Ultra‐Durable Information‐Encoded Anti‐Counterfeiting Self‐Assembled Nanocrystal Labels
Ultra‐durable cost‐effective information‐encoded anti‐counterfeiting labels are fabricated to secure semiconductor chips. A novel method is used to self‐assemble colloidal quantum wells (CQWs) into color bars. Information can be encoded spatially, spectrally, and opto‐spatially.
Taha Haddadifam +6 more
wiley +1 more source
An improved structure of fuzzy extractor without entropy leakage
The physical unclonable function(PUF) module cannot be directly applied to key generation due to the instability of the response, and the processing method of the fuzzy extractor brings the security risk of entropy leakage due to the disclosure of the ...
Pan Shesu, Zhang Jijun, Zhang Zhaofeng
doaj +1 more source
A Novel RFID Authentication Protocol Based on Reconfigurable RRAM PUF
Radio frequency identification technology (RFID) has empowered a wide variety of automation industries. Aiming at the current light-weight RFID encryption scheme with limited information protection methods, combined with the physical unclonable function (
Qirui Ren +6 more
doaj +1 more source
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices
The simplicity of deployment and perpetual operation of energy harvesting devices provides a compelling proposition for a new class of edge devices for the Internet of Things.
Chesser, Michael +5 more
core +1 more source
RRAM Variability Harvesting for CIM‐Integrated TRNG
This work demonstrates a compute‐in‐memory‐compatible true random number generator that harvests intrinsic cycle‐to‐cycle variability from a 1T1R RRAM array. Parallel entropy extraction enables high‐throughput bit generation without dedicated circuits. This approach achieves NIST‐compliant randomness and low per‐bit energy, offering a scalable hardware
Ankit Bende +4 more
wiley +1 more source

