An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

A PUF-based modeling-attack resilient authentication protocol for IoT devices

M Ebrahimabadi, M Younis… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) offer a promising solution for the authentication of
Internet of Things (IoT) devices as they provide unique fingerprints for the underlying …

An optimality summary: Secret key agreement with physical unclonable functions

O Günlü, RF Schaefer - Entropy, 2020 - mdpi.com
We address security and privacy problems for digital devices and biometrics from an
information-theoretic optimality perspective to conduct authentication, message …

PLGAKD: A PUF-based lightweight group authentication and key distribution protocol

H Yıldız, M Cenk, E Onur - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Securing Internet-of-Things (IoT) applications that collect and transport sensitive data by
guaranteeing authenticity, integrity, and confidentiality is a critical challenge. Reducing …

Secret key generation over biased physical unclonable functions with polar codes

B Chen, FMJ Willems - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices are usually small, low cost, and have limited resources,
which makes them vulnerable to physical and cloning attacks. To secure IoT devices …

Key recovery for content protection using ternary PUFs designed with pre-formed reram

BF Cambou, S Jain - Applied Sciences, 2022 - mdpi.com
Featured Application Protection, and secure delivery of digital files in a network of terminal
devices connected to a service provider. Abstract Physical unclonable functions, embedded …

Efficient RO-PUF for generation of identifiers and keys in resource-constrained embedded systems

MC Martínez-Rodríguez, LF Rojas-Muñoz… - Cryptography, 2022 - mdpi.com
The generation of unique identifiers extracted from the physical characteristics of the
underlying hardware ensures the protection of electronic devices against counterfeiting and …

Code constructions for physical unclonable functions and biometric secrecy systems

O Günlü, O İşcan, V Sidorenko… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The two-terminal key agreement problem with biometric or physical identifiers is considered.
Two linear code constructions based on Wyner-Ziv coding are developed. The first …

Key agreement with physical unclonable functions and biometric identifiers

O Gunlu - Cryptology ePrint Archive, 2021 - eprint.iacr.org
This thesis addresses security and privacy problems for digital devices and biometrics,
where a secret key is generated for authentication, identification, or secure computations. A …

Response-based cryptographic methods with ternary physical unclonable functions

B Cambou, C Philabaum, D Booher… - Advances in Information …, 2020 - Springer
Abstract Physical Unclonable Functions (PUFs) are used as hardware fingerprints for access
control, and authentication in mobile and wireless networks and Internet of Things. However …