Results 191 to 200 of about 155,386 (234)
Some of the next articles are maybe not open access.
Design Guidelines and Feedback Structure of Ring Oscillator PUF for Performance Improvement
IEEE Transactions on Computer-Aided Design of Integrated Circuits and SystemsThe physical unclonable function (PUF) is a hardware security primitive that is used to generate secret keys or identity authentication for chips using random manufacturing process variation (MPV).
Zhengfeng Huang +4 more
semanticscholar +1 more source
IEEE Transactions on Information Forensics and Security, 2022
As the demand for highly secure and dependable lightweight systems increases in the modern world, Physically Unclonable Functions (PUFs) continue to promise a lightweight alternative to high-cost encryption techniques and secure key storage.
Owen Millwood +5 more
semanticscholar +1 more source
As the demand for highly secure and dependable lightweight systems increases in the modern world, Physically Unclonable Functions (PUFs) continue to promise a lightweight alternative to high-cost encryption techniques and secure key storage.
Owen Millwood +5 more
semanticscholar +1 more source
IEEE Internet of Things Journal
The Internet of Things (IoT) plays an important role in all aspects of production and day-to-day life. However, owing to the frequently trusted authentication vulnerabilities, the physical unclonable function (PUF) has unique advantages in the field of ...
Ziyu Zhou, Pengjun Wang, Gang Li
semanticscholar +1 more source
The Internet of Things (IoT) plays an important role in all aspects of production and day-to-day life. However, owing to the frequently trusted authentication vulnerabilities, the physical unclonable function (PUF) has unique advantages in the field of ...
Ziyu Zhou, Pengjun Wang, Gang Li
semanticscholar +1 more source
A Weak PUF-Assisted Strong PUF With Inherent Immunity to Modeling Attacks and Ultra-Low BER
IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2022This paper presents a weak PUF-assisted strong PUF that combines the metrics between weak and strong PUFs. Unlike the conventional strong PUFs that rely on the nonlinear combination of a large number of entropy cells for high modeling attacks resilience,
Jiahao Liu +4 more
semanticscholar +1 more source
IEEE Transactions on Information Forensics and Security
In this paper, we propose a fully symmetrical obfuscated-interconnection PUF (SOI PUF), which contains $n$ delay stages with each stage having $4k$ obfuscated interconnections for resisting machine learning (ML)-based modeling attacks.
Chongyao Xu +4 more
semanticscholar +1 more source
In this paper, we propose a fully symmetrical obfuscated-interconnection PUF (SOI PUF), which contains $n$ delay stages with each stage having $4k$ obfuscated interconnections for resisting machine learning (ML)-based modeling attacks.
Chongyao Xu +4 more
semanticscholar +1 more source
SI PUF: An SRAM and Inverter-Based PUF With a Bit Error Rate of 0.0053% and 0.073/0.042 pJ/bit
IEEE Transactions on Circuits and Systems - II - Express BriefsThe physical unclonable function (PUF) can generate a unique identifier for each chip, ideal for key generation and chip anti-counterfeiting. The reliability of PUF is paramount, and therefore is one of the significant challenges for PUF design.
Li-qiang Ni +6 more
semanticscholar +1 more source
ACM Journal on Emerging Technologies in Computing Systems, 2016
In this work, we have studied two novel techniques to enhance the performance of existing geometry-based magnetoresistive RAM physically unclonable function (MRAM PUF). Geometry-based MRAM PUFs rely only on geometric variations in MRAM cells that generate preferred ground state in cells and form the basis of digital signature generation.
Jayita Das, Kevin Scott, Sanjukta Bhanja
openaire +1 more source
In this work, we have studied two novel techniques to enhance the performance of existing geometry-based magnetoresistive RAM physically unclonable function (MRAM PUF). Geometry-based MRAM PUFs rely only on geometric variations in MRAM cells that generate preferred ground state in cells and form the basis of digital signature generation.
Jayita Das, Kevin Scott, Sanjukta Bhanja
openaire +1 more source
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Cryptographers have proposed the notion of read-once keys (ROKs) as a beneficial tool for a number of applications, such as delegation of authority. The premise of ROKs is that the key is destroyed by the process of reading it, thus preventing subsequent accesses.
Kirkpatrick, Michael +2 more
openaire +2 more sources
Cryptographers have proposed the notion of read-once keys (ROKs) as a beneficial tool for a number of applications, such as delegation of authority. The premise of ROKs is that the key is destroyed by the process of reading it, thus preventing subsequent accesses.
Kirkpatrick, Michael +2 more
openaire +2 more sources
IEEE Transactions on Dependable and Secure Computing, 2019
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique identities to billions of connected devices in Internet of Things (IoTs).
Urbi Chatterjee +6 more
semanticscholar +1 more source
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique identities to billions of connected devices in Internet of Things (IoTs).
Urbi Chatterjee +6 more
semanticscholar +1 more source
Proceedings of the International Conference on Compilers, Architectures and Synthesis for Embedded Systems, 2016
Physically Unclonable Functions (PUFs) have proved to be an effective and low-cost measure against counterfeiting by providing device authentication and secure key storage services. Memory based PUF implementations are an attractive option due to the ubiquitous nature of memory in electronic devices and the requirement of minimal (or no) additional ...
Soubhagya Sutar +2 more
openaire +1 more source
Physically Unclonable Functions (PUFs) have proved to be an effective and low-cost measure against counterfeiting by providing device authentication and secure key storage services. Memory based PUF implementations are an attractive option due to the ubiquitous nature of memory in electronic devices and the requirement of minimal (or no) additional ...
Soubhagya Sutar +2 more
openaire +1 more source

