Results 1 to 10 of about 155,386 (234)

A PUF taxonomy [PDF]

open access: yesApplied Physics Reviews, 2019
Authentication is an essential cryptographic primitive that confirms the identity of parties during communications. For security, it is important that these identities are complex, in order to make them difficult to clone or guess. In recent years, physically unclonable functions (PUFs) have emerged, in which identities are embodied in structures ...
Thomas McGrath   +4 more
openaire   +3 more sources

A Novel FPGA Implementation of the NAND-PUF with Minimal Resource Usage and High Reliability

open access: yesCryptography, 2023
In this work we propose a novel implementation on recent Xilinx FPGA platforms of a PUF architecture based on the NAND SR-latch (referred to as NAND-PUF in the following) which achieves an extremely low resource usage with very good overall performance ...
Riccardo Della Sala, Giuseppe Scotti
doaj   +2 more sources

Memristor-based PUF for lightweight cryptographic randomness

open access: yesScientific Reports, 2022
Physical unclonable functions (PUF) are cryptographic primitives employed to generate true and intrinsic randomness which is critical for cryptographic and secure applications.
Hebatallah M. Ibrahim   +3 more
doaj   +2 more sources

Arbiter PUF—A Review of Design, Composition, and Security Aspects

open access: yesIEEE Access, 2023
Hardware security modules play a crucial role in protecting and preserving technologically integrated systems that are used in daily life. They employ cryptographic protocols to secure a system against adversaries. Generally, cryptographic algorithms and
S. Hemavathy, V. S. Kanchana Bhaaskaran
doaj   +2 more sources

Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2019
A physically unclonable function (PUF) is a circuit of which the input–output behavior is designed to be sensitive to the random variations of its manufacturing process. This building block hence facilitates the authentication of any given device in a population of identically laid-out silicon chips, similar to the biometric authentication of a human ...
Jeroen Delvaux
openaire   +3 more sources

A Novel Ultra-Compact FPGA PUF: The DD-PUF [PDF]

open access: yesCryptography, 2021
In this paper, we present a novel ultra-compact Physical Unclonable Function (PUF) architecture and its FPGA implementation. The proposed Delay Difference PUF (DD-PUF) is the most dense FPGA-compatible PUF ever reported in the literature, allowing the ...
Riccardo Della Sala   +2 more
doaj   +2 more sources

Characterization of TgPuf1, a member of the Puf family RNA-binding proteins from Toxoplasma gondii [PDF]

open access: yesParasites & Vectors, 2014
Background Puf proteins act as translational regulators and affect many cellular processes in a wide range of eukaryotic organisms. Although Puf proteins have been well characterized in many model systems, little is known about the structural and ...
Min Liu   +5 more
doaj   +2 more sources

Concealable physical unclonable functions using vertical NAND flash memory [PDF]

open access: yesNature Communications
Physical Unclonable Functions (PUFs) can address the demand for enhanced hardware security. Vertical NAND (V-NAND) flash memory is the most commercialized non-volatile memory.
Sung-Ho Park   +5 more
doaj   +2 more sources

Lightweight PUF-Based Gate Replacement Technique to Reduce Leakage of Information through Power Profile Analysis [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
The major challenge faced by electronic device designers is to defend the system from attackers and malicious modules called Hardware Trojans and to deliver a secured design.
Mohankumar N.   +2 more
doaj   +1 more source

Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure [PDF]

open access: yesComputer Science Journal of Moldova, 2022
Privacy and mutual authentication under corruption with temporary state disclosure are two significant requirements for real-life applications of RFID schemes. This paper proposes two practical RFID schemes that meet these requirements.
Ferucio Laurentiu Tiplea   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy