Results 41 to 50 of about 2,983 (191)
A formal definition and a new security mechanism of physical unclonable functions
The characteristic novelty of what is generally meant by a "physical unclonable function" (PUF) is precisely defined, in order to supply a firm basis for security evaluations and the proposal of new security mechanisms.
D. Lim +5 more
core +1 more source
Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a ...
A.-R. Sadeghi +16 more
core +4 more sources
Silicon photonic physical unclonable function
Physical unclonable functions (PUFs) serve as a hardware source of private information that cannot be duplicated and have applications in hardware integrity and information security. Here we demonstrate a photonic PUF based on ultrafast nonlinear optical interactions in a chaotic silicon micro-cavity.
Brian C, Grubel +6 more
openaire +2 more sources
A new Definition and Classification of Physical Unclonable Functions
A new definition of "Physical Unclonable Functions" (PUFs), the first one that fully captures its intuitive idea among experts, is presented. A PUF is an information-storage system with a security mechanism that is 1. meant to impede the duplication of
Merli, Dominik, Plaga, Rainer
core +1 more source
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices [PDF]
A very common approach adopted to fight the increasing sophistication and dangerousness of malware and hacking is to introduce more complex authentication mechanisms.
Alessio, Merlo +2 more
core +1 more source
Self-Timed Physically Unclonable Functions
Physically unclonable functions (PUFs) exploit the physical characteristics of silicon and provide an alternative to storing digital encryption keys in non-volatile memory. In this seminal work, I propose for the first time the use of self-timed logic to implement PUFs.
Murphy, Julian +5 more
openaire +2 more sources
Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions
We introduce the class of multiply constant-weight codes to improve the reliability of certain physically unclonable function (PUF) response. We extend classical coding methods to construct multiply constant-weight codes from known $q$-ary and constant ...
Chee, Yeow Meng +7 more
core +1 more source
CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs
Delay-based Physically Unclonable Functions (PUFs) are a popular choice for “keyless” cryptography in low-power devices. However, they have been subjected to modeling attacks using Machine Learning (ML) approaches, leading to improved PUF designs that ...
Nimish Mishra +5 more
doaj +1 more source
Authentication protocols are often used in smart grids to deliver the necessary level of security. A huge number of clients in such a system, however, provides the attacker with the ability to clone them, for example.
Masoumeh Safkhani +6 more
doaj +1 more source
Quantum cloning attacks against PUF-based quantum authentication systems
With the advent of Physical Unclonable Functions (PUFs), PUF-based quantum authentication systems (QAS) have been proposed for security purposes and recently proof-of-principle experiment has been demonstrated.
Gao, Ming, Li, Mo, Yao, Yao, Zhang, Jian
core +1 more source

