AI makes crypto evolve

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
The recent literature reveals a dichotomy formed by a coevolution between cryptography
and Artificial Intelligence (AI). This dichotomy consists of two sides, namely Crypto …

Homogeneous and heterogeneous feed-forward XOR physical unclonable functions

SVS Avvaru, Z Zeng, KK Parhi - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) are hardware security primitives that are used for
device authentication and cryptographic key generation. Standard XOR PUFs typically …

Privacy-preserving authentication protocols for iot devices using the sirf puf

J Plusquellic, EE Tsiropoulou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Authentication between IoT devices is important for maintaining security, trust and data
integrity in an edge device ecosystem. The low-power, reduced computing capacity of the …

NoPUF: A novel PUF design framework toward modeling attack resistant PUFs

A Wang, W Tan, Y Wen, Y Lao - IEEE Transactions on Circuits …, 2021 - ieeexplore.ieee.org
With the rapid development and globalization of the semiconductor industry, hardware
security has emerged as a critical concern. New attacking and tampering methods are …

Rihann: Remote iot hardware authentication with intrinsic identifiers

SD Paul, F Zhang, P SLPSK… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
The heterogeneous array of edge devices in an Internet of Things (IoT) infrastructure is
increasingly vulnerable to physical in-field tampering attacks. These devices can …

Efficient fuzzy extractor implementations for PUF based authentication

Y Wen, Y Lao - … 12th International Conference on Malicious and …, 2017 - ieeexplore.ieee.org
A strong security management of digital system should take all phases of lifecycle into
consideration as the adversary can simply take advantage of the weakest link to …

FPGA based delay PUF implementation for security applications

MA Kumar, R Bhakthavatchalu - 2017 International Conference …, 2017 - ieeexplore.ieee.org
A new type of authentication of a device or chip called Physically Unclonable functions
(PUFs) is developed such that, with the built-in manufacturing differences, it provides …

IOTSafe, decoupling security from applications for a safer IOT

JDDH Diego, J Saldana, J Fernández-Navajas… - IEEE …, 2019 - ieeexplore.ieee.org
The use of robust security solutions is a must for the Internet of Things (IoT) devices and their
applications: regulators in different countries are creating frameworks for certifying those …

PUF modeling attack using active learning

Y Wen, Y Lao - 2018 IEEE International Symposium on Circuits …, 2018 - ieeexplore.ieee.org
Along with the rapid development of hardware security techniques, the revolutionary growth
of countermeasures or attacking methods developed by intelligent and adaptive adversaries …

Design rationale for symbiotically secure key management systems in IoT and beyond

W Bartsch, P Gope, E Kavun… - Proceedings of the …, 2023 - eprints.whiterose.ac.uk
The overwhelmingly widespread use of Internet of Things (IoT) in different application
domains brought not only benefits, but, alas, security concerns as a result of the increased …