Physical unclonable function: Architectures, applications and challenges for dependable security
Physical unclonable function (PUF) is hardware‐specific security primitive for providing
cryptographic functionalities that are applicable for secure communication among the …
cryptographic functionalities that are applicable for secure communication among the …
PUF modeling attacks on simulated and silicon data
We discuss numerical modeling attacks on several proposed strong physical unclonable
functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal …
functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal …
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be
broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a …
broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a …
The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and
stable, and which possesses a rigorous security argument, has been a fundamental problem …
stable, and which possesses a rigorous security argument, has been a fundamental problem …
Splitting the interpose PUF: A novel modeling attack strategy
We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based
design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by …
design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by …
PUFs at a glance
U Rührmair, DE Holcomb - 2014 Design, Automation & Test in …, 2014 - ieeexplore.ieee.org
Physical Unclonable Functions (PUFs) are a new, hardware-based security primitive, which
has been introduced just about a decade ago. In this paper, we provide a brief and easily …
has been introduced just about a decade ago. In this paper, we provide a brief and easily …
A case of lightweight PUF constructions: Cryptanalysis and machine learning attacks
Due to their unique physical properties, physically unclonable functions (PUF) have been
proposed widely as versatile cryptographic primitives. It is desirable that silicon PUF circuits …
proposed widely as versatile cryptographic primitives. It is desirable that silicon PUF circuits …
[HTML][HTML] Security analysis of machine learning-based puf enrollment protocols: A review
S Khalfaoui, J Leneutre, A Villard, I Gazeau, J Ma… - Sensors, 2021 - mdpi.com
The demand for Internet of Things services is increasing exponentially, and consequently a
large number of devices are being deployed. To efficiently authenticate these objects, the …
large number of devices are being deployed. To efficiently authenticate these objects, the …
PUF modeling attacks: An introduction and overview
U Rührmair, J Sölter - 2014 Design, Automation & Test in …, 2014 - ieeexplore.ieee.org
Machine learning (ML) based modeling attacks are the currently most relevant and effective
attack form for so-called Strong Physical Unclonable Functions (Strong PUFs). We provide …
attack form for so-called Strong Physical Unclonable Functions (Strong PUFs). We provide …
Lightweight cloud computing-based RFID authentication protocols using PUF for e-healthcare systems
TF Lee, KW Lin, YP Hsieh, KC Lee - IEEE Sensors Journal, 2023 - ieeexplore.ieee.org
In the presence of convenience, cloud computing services have increasingly become used
to resolve low-latency and high-efficiency issues. In particular, they can help medical staff …
to resolve low-latency and high-efficiency issues. In particular, they can help medical staff …