AI makes crypto evolve
B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
The recent literature reveals a dichotomy formed by a coevolution between cryptography
and Artificial Intelligence (AI). This dichotomy consists of two sides, namely Crypto …
and Artificial Intelligence (AI). This dichotomy consists of two sides, namely Crypto …
Homogeneous and heterogeneous feed-forward XOR physical unclonable functions
Physical unclonable functions (PUFs) are hardware security primitives that are used for
device authentication and cryptographic key generation. Standard XOR PUFs typically …
device authentication and cryptographic key generation. Standard XOR PUFs typically …
Privacy-preserving authentication protocols for iot devices using the sirf puf
J Plusquellic, EE Tsiropoulou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Authentication between IoT devices is important for maintaining security, trust and data
integrity in an edge device ecosystem. The low-power, reduced computing capacity of the …
integrity in an edge device ecosystem. The low-power, reduced computing capacity of the …
NoPUF: A novel PUF design framework toward modeling attack resistant PUFs
With the rapid development and globalization of the semiconductor industry, hardware
security has emerged as a critical concern. New attacking and tampering methods are …
security has emerged as a critical concern. New attacking and tampering methods are …
Rihann: Remote iot hardware authentication with intrinsic identifiers
The heterogeneous array of edge devices in an Internet of Things (IoT) infrastructure is
increasingly vulnerable to physical in-field tampering attacks. These devices can …
increasingly vulnerable to physical in-field tampering attacks. These devices can …
Efficient fuzzy extractor implementations for PUF based authentication
A strong security management of digital system should take all phases of lifecycle into
consideration as the adversary can simply take advantage of the weakest link to …
consideration as the adversary can simply take advantage of the weakest link to …
FPGA based delay PUF implementation for security applications
MA Kumar, R Bhakthavatchalu - 2017 International Conference …, 2017 - ieeexplore.ieee.org
A new type of authentication of a device or chip called Physically Unclonable functions
(PUFs) is developed such that, with the built-in manufacturing differences, it provides …
(PUFs) is developed such that, with the built-in manufacturing differences, it provides …
IOTSafe, decoupling security from applications for a safer IOT
The use of robust security solutions is a must for the Internet of Things (IoT) devices and their
applications: regulators in different countries are creating frameworks for certifying those …
applications: regulators in different countries are creating frameworks for certifying those …
PUF modeling attack using active learning
Along with the rapid development of hardware security techniques, the revolutionary growth
of countermeasures or attacking methods developed by intelligent and adaptive adversaries …
of countermeasures or attacking methods developed by intelligent and adaptive adversaries …
Design rationale for symbiotically secure key management systems in IoT and beyond
The overwhelmingly widespread use of Internet of Things (IoT) in different application
domains brought not only benefits, but, alas, security concerns as a result of the increased …
domains brought not only benefits, but, alas, security concerns as a result of the increased …