Results 31 to 40 of about 2,983 (191)

Physical Unclonable Function [PDF]

open access: yes, 2019
A Physical Unclonable Function (PUF) is hardware that acts as a one-way function, whose each different instance provides unique outputs for the same distinct input. Although recent research has demonstrated the merits of PUFs as security primitives for resource-constrained computer systems, better implementations of them need to be identified ...
openaire   +1 more source

Q-Class Authentication System for Double Arbiter PUF [PDF]

open access: yes, 2018
Physically Unclonable Function (PUF) is a cryptographic primitive that is based on physical property of each entity or Integrated Circuit (IC) chip. It is expected that PUF be used in security applications such as ID generation and authentication.
Kazuo SAKIYAMA   +3 more
core   +2 more sources

Physical Unclonable Functions

open access: yesDatenschutz und Datensicherheit - DuD, 2012
Eingebettete Systeme bestimmen heutzutage weitgehend die Funktionalität von Automobilen, Industrieanlagen und mobilen Endgeräten. Mit der steigenden Vernetzung dieser Systeme gewinnt deren Sicherheit gegen Angriffe und böswillige Veränderungen zunehmend an Bedeutung.
Stefan Katzenbeisser, André Schaller
openaire   +3 more sources

On Improving Reliability of SRAM-Based Physically Unclonable Functions

open access: yesJournal of Low Power Electronics and Applications, 2017
Physically unclonable functions (PUFs) have been touted for their inherent resistance to invasive attacks and low cost in providing a hardware root of trust for various security applications.
Arunkumar Vijayakumar   +2 more
doaj   +1 more source

Creating and balancing the paths of arbiter-based physically unclonable functions on FPGA

open access: yesInformatika, 2022
Objectives. The problem of constructing a new structure of paths of physically unclonable function of the arbiter type (APUF) on the FPGA is being solved, based on the full use of internal resources of LUT-blocks, which are functionally repeaters.
A. Yu. Shamyna, A. A. Ivaniuk
doaj   +1 more source

Dynamic Physically Unclonable Functions [PDF]

open access: yesProceedings of the 2019 Great Lakes Symposium on VLSI, 2019
Physical variations in the manufacturing processes of electronic devices have been widely leveraged to design Physically Unclonable Functions (PUFs), which can be used for authentication and key storage. Existing PUFs are static, as their PUF responses remain the same regardless when the PUF is queried. Meanwhile, this paper presents the new concept of
Wenjie Xiong   +3 more
openaire   +1 more source

Study of a New Method of Radio-Sensor Identification of Radio-Electronic Devices [PDF]

open access: yesTelfor Journal, 2023
The purpose of this work is to increase the protection of radio-electronic devices from illegal cloning, by studying a new physically unclonable functions (PUF) connected with the own electromagnetic radiation of a radio-electronic device.
K. А. Boikov
doaj   +1 more source

Platform for Testing and Evaluation of PUF and TRNG Implementations in FPGAs [PDF]

open access: yes, 2016
Implementation of cryptographic primitives like Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs) depends significantly on the underlying hardware.
Drutarovsky, Milos   +3 more
core   +1 more source

Reconfigurable Physically Unclonable Functions Based on Nanoscale Voltage‐Controlled Magnetic Tunnel Junctions

open access: yesAdvanced Electronic Materials, 2023
With the fast growth of the number of electronic devices on the internet of things (IoT), hardware‐based security primitives such as physically unclonable functions (PUFs) have emerged to overcome the shortcomings of conventional software‐based ...
Yixin Shao   +5 more
doaj   +1 more source

Biological physically unclonable function [PDF]

open access: yesCommunications Physics, 2019
AbstractInformation security is one of the foundational requirements for any modern society thriving on digital connectivity. At present, information security is accomplished either through software algorithms or hardware protocols. Software algorithms use pseudo random numbers generated by one-way mathematical functions that are computationally robust
Akshay Wali   +7 more
openaire   +1 more source

Home - About - Disclaimer - Privacy