Review of error correction for PUFs and evaluation on state-of-the-art FPGAs
M Hiller, L Kürzinger, G Sigl - Journal of cryptographic engineering, 2020 - Springer
Efficient error correction and key derivation is a prerequisite to generate secure and reliable
keys from PUFs. The most common methods can be divided into linear schemes and pointer …
keys from PUFs. The most common methods can be divided into linear schemes and pointer …
B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection
V Immler, J Obermaier, M König… - … on hardware oriented …, 2018 - ieeexplore.ieee.org
Protecting embedded devices against physical attacks is a challenging task since the
attacker has control of the device in a hostile environment. To address this issue, current …
attacker has control of the device in a hostile environment. To address this issue, current …
New insights to key derivation for tamper-evident physical unclonable functions
V Immler, K Uppund - IACR Transactions on Cryptographic Hardware …, 2019 - tches.iacr.org
Several publications presented tamper-evident Physical Unclonable Functions (PUFs) for
secure storage of cryptographic keys and tamper-detection. Unfortunately, previously …
secure storage of cryptographic keys and tamper-detection. Unfortunately, previously …
A measurement system for capacitive PUF-based security enclosures
Battery-backed security enclosures that are permanently monitored for penetration and
tampering are common solutions for providing physical integrity to multi-chip embedded …
tampering are common solutions for providing physical integrity to multi-chip embedded …
Normalization and multi-valued symbol extraction from RO-PUFs for enhanced uniform probability distributions
Physical Unclonable Functions (PUFs) offer the possibility for on-chip generation of unique
fingerprints for integrated circuits. Ring-oscillator (RO) PUFs are small and easy to configure …
fingerprints for integrated circuits. Ring-oscillator (RO) PUFs are small and easy to configure …
The past, present, and future of physical security enclosures: from battery-backed monitoring to puf-based inherent security and beyond
J Obermaier, V Immler - Journal of hardware and systems security, 2018 - Springer
Withstanding physical attacks in a hostile environment is of utmost importance for nowadays
electronics. However, due to the long and costly development of integrated circuits (ICs), IC …
electronics. However, due to the long and costly development of integrated circuits (ICs), IC …
Coded modulation and shaping for multivalued physical unclonable functions
RFH Fischer, S Müelich - IEEE Access, 2022 - ieeexplore.ieee.org
In this paper, a coded modulation scheme employing signal shaping is proposed and
designed for use in multi-valued physical unclonable functions (PUFs). In the literature …
designed for use in multi-valued physical unclonable functions (PUFs). In the literature …
Puf-entropy extraction of dac intersymbol-interference using continuous-time delta-sigma adcs
B Driemeyer, H Mandry, DP Wiens… - 2022 29th IEEE …, 2022 - ieeexplore.ieee.org
This work proposes a new method of Physical-Unclonable-Function (PUF) entropy
extraction and for ADC fingerprinting using a DAC's Intersymbol-Interference (ISI). The …
extraction and for ADC fingerprinting using a DAC's Intersymbol-Interference (ISI). The …
The wiretap channel for capacitive PUF-based security enclosures
K Garb, M Xhemrishi, L Kürzinger, C Frisch - arXiv preprint arXiv …, 2022 - arxiv.org
In order to protect devices from physical manipulations, protective security enclosures were
developed. However, these battery-backed solutions come with a reduced lifetime, and have …
developed. However, these battery-backed solutions come with a reduced lifetime, and have …
Helper Data Schemes for Coded Modulation and Shaping in Physical Unclonable Functions
RFH Fischer - arXiv preprint arXiv:2402.18980, 2024 - arxiv.org
In this paper, we consider the generation and utilization of helper data for physical
unclonable functions (PUFs) that provide real-valued readout symbols. Compared to …
unclonable functions (PUFs) that provide real-valued readout symbols. Compared to …