An overview of information-theoretic security and privacy: Metrics, limits and applications
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
A PUF-based modeling-attack resilient authentication protocol for IoT devices
M Ebrahimabadi, M Younis… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) offer a promising solution for the authentication of
Internet of Things (IoT) devices as they provide unique fingerprints for the underlying …
Internet of Things (IoT) devices as they provide unique fingerprints for the underlying …
An optimality summary: Secret key agreement with physical unclonable functions
O Günlü, RF Schaefer - Entropy, 2020 - mdpi.com
We address security and privacy problems for digital devices and biometrics from an
information-theoretic optimality perspective to conduct authentication, message …
information-theoretic optimality perspective to conduct authentication, message …
PLGAKD: A PUF-based lightweight group authentication and key distribution protocol
Securing Internet-of-Things (IoT) applications that collect and transport sensitive data by
guaranteeing authenticity, integrity, and confidentiality is a critical challenge. Reducing …
guaranteeing authenticity, integrity, and confidentiality is a critical challenge. Reducing …
Secret key generation over biased physical unclonable functions with polar codes
B Chen, FMJ Willems - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices are usually small, low cost, and have limited resources,
which makes them vulnerable to physical and cloning attacks. To secure IoT devices …
which makes them vulnerable to physical and cloning attacks. To secure IoT devices …
Key recovery for content protection using ternary PUFs designed with pre-formed reram
BF Cambou, S Jain - Applied Sciences, 2022 - mdpi.com
Featured Application Protection, and secure delivery of digital files in a network of terminal
devices connected to a service provider. Abstract Physical unclonable functions, embedded …
devices connected to a service provider. Abstract Physical unclonable functions, embedded …
Efficient RO-PUF for generation of identifiers and keys in resource-constrained embedded systems
MC Martínez-Rodríguez, LF Rojas-Muñoz… - Cryptography, 2022 - mdpi.com
The generation of unique identifiers extracted from the physical characteristics of the
underlying hardware ensures the protection of electronic devices against counterfeiting and …
underlying hardware ensures the protection of electronic devices against counterfeiting and …
Code constructions for physical unclonable functions and biometric secrecy systems
The two-terminal key agreement problem with biometric or physical identifiers is considered.
Two linear code constructions based on Wyner-Ziv coding are developed. The first …
Two linear code constructions based on Wyner-Ziv coding are developed. The first …
Key agreement with physical unclonable functions and biometric identifiers
O Gunlu - Cryptology ePrint Archive, 2021 - eprint.iacr.org
This thesis addresses security and privacy problems for digital devices and biometrics,
where a secret key is generated for authentication, identification, or secure computations. A …
where a secret key is generated for authentication, identification, or secure computations. A …
Response-based cryptographic methods with ternary physical unclonable functions
B Cambou, C Philabaum, D Booher… - Advances in Information …, 2020 - Springer
Abstract Physical Unclonable Functions (PUFs) are used as hardware fingerprints for access
control, and authentication in mobile and wireless networks and Internet of Things. However …
control, and authentication in mobile and wireless networks and Internet of Things. However …