Results 91 to 100 of about 3,075 (191)
Extended Abstract: Analysis of 1000 Arbiter PUF based RFID Tags [PDF]
In this extended abstract a large-scale analysis of 4- way Arbiter PUFs is performed with measurement results from 1000 RFID tags. Arbiter PUFs are one of the most important building blocks in PUF-based protocols and have been the subject of many ...
Becker, Georg T. +2 more
core
Physically unclonable functions (PUFs) of reconfigurable feedback field‐effect transistors (R‐FBFETs) with polycrystalline silicon channels are designed for dual entropy sources. The uniqueness and reliability of the dual entropy source PUF are verified by inter‐ and intra‐Hamming distances of 49.13% and 3.47%, respectively, as well as NIST statistical
Taeho Park +4 more
wiley +1 more source
A Low-Cost Unified Experimental FPGA Board for Cryptography Applications [PDF]
This paper describes the evaluation of available experimental boards, the comparison of their supported set of experiments and other aspects. The second part of this evaluation is focused on the design process of the PCB (Printed Circuit Board) for ...
Bartík, Matěj, Buček, Jiří
core
Emerging Trends in Nanophotonic Systems for Sustainable and Resilient Societies
Nanophotonics provides a versatile platform for addressing emerging safety challenges, enabling real–time sensing, secure authentication, and adaptive vision control. This review highlights recent advances in nanophotonic materials and structures that translate nanoscale light–matter interactions into safety–critical applications, paving the way for ...
Hyun Min Kim +7 more
wiley +1 more source
As PUFs become ubiquitous for commercial products (e.g., FPGAs from Xilinx, Altera, and Microsemi), attacks against these primitives are evolving toward more omnipresent and even advanced techniques.
Fatemeh Ganji +2 more
doaj +1 more source
ABSTRACT The infiltration of counterfeit, fraudulent, and suspect items into civil nuclear supply chains, notably within power generation and medical isotope production, poses severe safety and security threats. The ever‐increasing growth in nuclear installations (70 power plants are under construction and another 100 are in the planning stage) and the
Hafiz Ahmed
wiley +1 more source
Secure Authentication via Quantum Physical Unclonable Functions: A Review
This in‐depth review article examines the origins, development, and evolution of Quantum Physical Unclonable Functions (QPUFs), with a particular focus on their use in secure authentication. The topic is motivated and introduced in detail, addressing both theoretical foundations and practical implementations, and is supported by a systematic article ...
Pol Julià Farré +8 more
wiley +1 more source
Physical cryptography and security of digital devices
The article presents the main scientific results and practical achievements obtained by undergraduate and graduate students of Computer Science department of BSUIR under the supervision of professor A.A. Ivaniuk during the period from 2014 to 2018.
A. A. Ivaniuk, S. S. Zalivaka
doaj
Weak Physycally Unclonable Functions in CMOS Technology: A Review
Physically unclonable functions (PUFs) represent emerging cryptographic primitives that exploit the uncertainty of the CMOS manufacturing process as an entropy source for generating unique, random and stable keys. These devices can be potentially used in
Massimo Vatalaro +3 more
doaj +1 more source
A PUF-based cryptographic security solution for IoT systems on chip
The integration of multicore processors and peripherals from multiple intellectual property core providers as hardware components of IoT multiprocessor systems-on-chip (SoC) represents a source of security vulnerabilities for the in-chip communication ...
Alexandra Balan +3 more
doaj +1 more source

