Review of error correction for PUFs and evaluation on state-of-the-art FPGAs

M Hiller, L Kürzinger, G Sigl - Journal of cryptographic engineering, 2020 - Springer
Efficient error correction and key derivation is a prerequisite to generate secure and reliable
keys from PUFs. The most common methods can be divided into linear schemes and pointer …

B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection

V Immler, J Obermaier, M König… - … on hardware oriented …, 2018 - ieeexplore.ieee.org
Protecting embedded devices against physical attacks is a challenging task since the
attacker has control of the device in a hostile environment. To address this issue, current …

New insights to key derivation for tamper-evident physical unclonable functions

V Immler, K Uppund - IACR Transactions on Cryptographic Hardware …, 2019 - tches.iacr.org
Several publications presented tamper-evident Physical Unclonable Functions (PUFs) for
secure storage of cryptographic keys and tamper-detection. Unfortunately, previously …

A measurement system for capacitive PUF-based security enclosures

J Obermaier, V Immler, M Hiller, G Sigl - Proceedings of the 55th Annual …, 2018 - dl.acm.org
Battery-backed security enclosures that are permanently monitored for penetration and
tampering are common solutions for providing physical integrity to multi-chip embedded …

Normalization and multi-valued symbol extraction from RO-PUFs for enhanced uniform probability distributions

H Mandry, A Herkle, S Müelich, J Becker… - … on Circuits and …, 2020 - ieeexplore.ieee.org
Physical Unclonable Functions (PUFs) offer the possibility for on-chip generation of unique
fingerprints for integrated circuits. Ring-oscillator (RO) PUFs are small and easy to configure …

The past, present, and future of physical security enclosures: from battery-backed monitoring to puf-based inherent security and beyond

J Obermaier, V Immler - Journal of hardware and systems security, 2018 - Springer
Withstanding physical attacks in a hostile environment is of utmost importance for nowadays
electronics. However, due to the long and costly development of integrated circuits (ICs), IC …

Coded modulation and shaping for multivalued physical unclonable functions

RFH Fischer, S Müelich - IEEE Access, 2022 - ieeexplore.ieee.org
In this paper, a coded modulation scheme employing signal shaping is proposed and
designed for use in multi-valued physical unclonable functions (PUFs). In the literature …

Puf-entropy extraction of dac intersymbol-interference using continuous-time delta-sigma adcs

B Driemeyer, H Mandry, DP Wiens… - 2022 29th IEEE …, 2022 - ieeexplore.ieee.org
This work proposes a new method of Physical-Unclonable-Function (PUF) entropy
extraction and for ADC fingerprinting using a DAC's Intersymbol-Interference (ISI). The …

The wiretap channel for capacitive PUF-based security enclosures

K Garb, M Xhemrishi, L Kürzinger, C Frisch - arXiv preprint arXiv …, 2022 - arxiv.org
In order to protect devices from physical manipulations, protective security enclosures were
developed. However, these battery-backed solutions come with a reduced lifetime, and have …

Helper Data Schemes for Coded Modulation and Shaping in Physical Unclonable Functions

RFH Fischer - arXiv preprint arXiv:2402.18980, 2024 - arxiv.org
In this paper, we consider the generation and utilization of helper data for physical
unclonable functions (PUFs) that provide real-valued readout symbols. Compared to …