Results 61 to 70 of about 2,983 (191)
Extended Abstract: Analysis of 1000 Arbiter PUF based RFID Tags [PDF]
In this extended abstract a large-scale analysis of 4- way Arbiter PUFs is performed with measurement results from 1000 RFID tags. Arbiter PUFs are one of the most important building blocks in PUF-based protocols and have been the subject of many ...
Becker, Georg T. +2 more
core
This review explores recent advances in digital micromirror device (DMD)‐based lithography, focusing on its programmable light modulation, multi‐material compatibility, and dimensional patterning strategies. It highlights innovations from optical system design to materials integration and multifunctional applications, positioning DMD lithography as a ...
Yubin Lee +5 more
wiley +1 more source
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices
The simplicity of deployment and perpetual operation of energy harvesting devices provides a compelling proposition for a new class of edge devices for the Internet of Things.
Chesser, Michael +5 more
core +1 more source
Ultra‐Durable Information‐Encoded Anti‐Counterfeiting Self‐Assembled Nanocrystal Labels
Ultra‐durable cost‐effective information‐encoded anti‐counterfeiting labels are fabricated to secure semiconductor chips. A novel method is used to self‐assemble colloidal quantum wells (CQWs) into color bars. Information can be encoded spatially, spectrally, and opto‐spatially.
Taha Haddadifam +6 more
wiley +1 more source
RRAM Variability Harvesting for CIM‐Integrated TRNG
This work demonstrates a compute‐in‐memory‐compatible true random number generator that harvests intrinsic cycle‐to‐cycle variability from a 1T1R RRAM array. Parallel entropy extraction enables high‐throughput bit generation without dedicated circuits. This approach achieves NIST‐compliant randomness and low per‐bit energy, offering a scalable hardware
Ankit Bende +4 more
wiley +1 more source
The Internet of Things (IoT) acts as an umbrella for the Internet-enabled devices for various applications, such as smart home, smart city, smart grid, and smart healthcare.
Soumya Banerjee +5 more
doaj +1 more source
Modeling attacks on physical unclonable functions [PDF]
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PUF, our attacks construct a computer algorithm which behaves indistinguishably from the original PUF on almost all CRPs.
Ulrich, Ruhrmair +5 more
openaire +4 more sources
Barrel Shifter Physical Unclonable Function Based Encryption
Physical Unclonable Functions (PUFs) are circuits designed to extract physical randomness from the underlying circuit. This randomness depends on the manufacturing process.
Dee, Timothy +2 more
core +1 more source
Physically unclonable functions (PUFs) of reconfigurable feedback field‐effect transistors (R‐FBFETs) with polycrystalline silicon channels are designed for dual entropy sources. The uniqueness and reliability of the dual entropy source PUF are verified by inter‐ and intra‐Hamming distances of 49.13% and 3.47%, respectively, as well as NIST statistical
Taeho Park +4 more
wiley +1 more source
The dependence between the write time and process variation of a memristor was investigated as a candidate physically unclonable function (PUF). Such write-time-based approach requires exact timing control of the programming pulse to achieve well ...
Ha-Phuong Nguyen +4 more
doaj +1 more source

