Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs [PDF]
A physically unclonable function (PUF) is a circuit of which the input–output behavior is designed to be sensitive to the random variations of its manufacturing process. This building block hence facilitates the authentication of any given device in a population of identically laid-out silicon chips, similar to the biometric authentication of a human ...
Jeroen Delvaux
exaly +3 more sources
A Novel Ultra-Compact FPGA PUF: The DD-PUF [PDF]
In this paper, we present a novel ultra-compact Physical Unclonable Function (PUF) architecture and its FPGA implementation. The proposed Delay Difference PUF (DD-PUF) is the most dense FPGA-compatible PUF ever reported in the literature, allowing the ...
Riccardo Della Sala +2 more
doaj +2 more sources
Characterization of TgPuf1, a member of the Puf family RNA-binding proteins from Toxoplasma gondii [PDF]
Background Puf proteins act as translational regulators and affect many cellular processes in a wide range of eukaryotic organisms. Although Puf proteins have been well characterized in many model systems, little is known about the structural and ...
Min Liu +5 more
doaj +2 more sources
Lightweight PUF-Based Gate Replacement Technique to Reduce Leakage of Information through Power Profile Analysis [PDF]
The major challenge faced by electronic device designers is to defend the system from attackers and malicious modules called Hardware Trojans and to deliver a secured design.
Mohankumar N. +2 more
doaj +1 more source
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure [PDF]
Privacy and mutual authentication under corruption with temporary state disclosure are two significant requirements for real-life applications of RFID schemes. This paper proposes two practical RFID schemes that meet these requirements.
Ferucio Laurentiu Tiplea +2 more
doaj +1 more source
Recyclable PUFs: logically reconfigurable PUFs [PDF]
Physically Unclonable Functions (PUFs) are security primitives that exploit intrinsic random physical variations of hardware components. In the recent years, many security solutions based on PUFs have been proposed, including identification/authentication schemes, key storage and hardware-entangled cryptography.
Katzenbeisser S. +5 more
openaire +3 more sources
Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare
Replay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication ...
Rizka Reza Pahlevi +2 more
doaj +1 more source
Security Evaluation of n-Choose-k-Sum PUFs Against Modeling Attacks
A physical unclonable function (PUF) generates hardware intrinsic volatile secrets by exploiting uncontrollable manufacturing randomness. Several PUF candidates use challenge-response pairs (CRPs) to enhance their security.
Lihui Pang +4 more
doaj +1 more source
PUF-FSM: A Controlled Strong PUF [PDF]
Existing strong controlled physical unclonable function (PUF) designs are built to resist modeling attacks and they deal with noisy PUF responses by exploiting error correction logic. These designs are burdened by the costs of the error correction logic and information shown to leak through the associated helper data for assisting error corrections ...
Gao, Y. +4 more
openaire +4 more sources
The Puf-A Protein Is Required for Primordial Germ Cell Development
Puf-A, a nucleolar Puf domain protein, is required for ribosome biogenesis. A study of Puf-A in zebrafish has shown that Puf-A is highly expressed in primordial germ cells (PGCs) and participates in PGC development.
Chi-Fong Ko +3 more
doaj +1 more source

