Results 41 to 50 of about 2,983 (191)

A formal definition and a new security mechanism of physical unclonable functions

open access: yes, 2012
The characteristic novelty of what is generally meant by a "physical unclonable function" (PUF) is precisely defined, in order to supply a firm basis for security evaluations and the proposal of new security mechanisms.
D. Lim   +5 more
core   +1 more source

Greater Expectations? [PDF]

open access: yes, 1987
Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a ...
A.-R. Sadeghi   +16 more
core   +4 more sources

Silicon photonic physical unclonable function

open access: yesOptics Express, 2017
Physical unclonable functions (PUFs) serve as a hardware source of private information that cannot be duplicated and have applications in hardware integrity and information security. Here we demonstrate a photonic PUF based on ultrafast nonlinear optical interactions in a chaotic silicon micro-cavity.
Brian C, Grubel   +6 more
openaire   +2 more sources

A new Definition and Classification of Physical Unclonable Functions

open access: yes, 2015
A new definition of "Physical Unclonable Functions" (PUFs), the first one that fully captures its intuitive idea among experts, is presented. A PUF is an information-storage system with a security mechanism that is 1. meant to impede the duplication of
Merli, Dominik, Plaga, Rainer
core   +1 more source

Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices [PDF]

open access: yes, 2018
A very common approach adopted to fight the increasing sophistication and dangerousness of malware and hacking is to introduce more complex authentication mechanisms.
Alessio, Merlo   +2 more
core   +1 more source

Self-Timed Physically Unclonable Functions

open access: yes2012 5th International Conference on New Technologies, Mobility and Security (NTMS), 2012
Physically unclonable functions (PUFs) exploit the physical characteristics of silicon and provide an alternative to storing digital encryption keys in non-volatile memory. In this seminal work, I propose for the first time the use of self-timed logic to implement PUFs.
Murphy, Julian   +5 more
openaire   +2 more sources

Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions

open access: yes, 2014
We introduce the class of multiply constant-weight codes to improve the reliability of certain physically unclonable function (PUF) response. We extend classical coding methods to construct multiply constant-weight codes from known $q$-ary and constant ...
Chee, Yeow Meng   +7 more
core   +1 more source

CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Delay-based Physically Unclonable Functions (PUFs) are a popular choice for “keyless” cryptography in low-power devices. However, they have been subjected to modeling attacks using Machine Learning (ML) approaches, leading to improved PUF designs that ...
Nimish Mishra   +5 more
doaj   +1 more source

Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids

open access: yesMathematics, 2022
Authentication protocols are often used in smart grids to deliver the necessary level of security. A huge number of clients in such a system, however, provides the attacker with the ability to clone them, for example.
Masoumeh Safkhani   +6 more
doaj   +1 more source

Quantum cloning attacks against PUF-based quantum authentication systems

open access: yes, 2016
With the advent of Physical Unclonable Functions (PUFs), PUF-based quantum authentication systems (QAS) have been proposed for security purposes and recently proof-of-principle experiment has been demonstrated.
Gao, Ming, Li, Mo, Yao, Yao, Zhang, Jian
core   +1 more source

Home - About - Disclaimer - Privacy