Review of error correction for PUFs and evaluation on state-of-the-art FPGAs

M Hiller, L Kürzinger, G Sigl - Journal of cryptographic engineering, 2020 - Springer
Efficient error correction and key derivation is a prerequisite to generate secure and reliable
keys from PUFs. The most common methods can be divided into linear schemes and pointer …

Impedanceverif: On-chip impedance sensing for system-level tampering detection

T Mosavirik, P Schaumont, S Tajik - IACR Transactions on …, 2023 - tosc.iacr.org
Physical attacks can compromise the security of cryptographic devices. Depending on the
attack's requirements, adversaries might need to (i) place probes in the proximity of the …

Interleaved challenge loop PUF: a highly side-channel protected oscillator-based PUF

L Tebelmann, JL Danger, M Pehl - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Physical Unclonable Functions (PUFs) leverage manufacturing variations to generate
device-specific keys during runtime only, overcoming the need for protection after power-off …

A SC PUF standard cell used for key generation and anti-invasive-attack protection

Y Zhang, Z He, M Wan, J Liu, H Gu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
By using metal blocks as the protective coating, placing the sensitive signals in last but
second metal (LSM), integrating a low-cost one-time programming (OTP) cell in each PUF …

A multilevel coding scheme for multi-valued physical unclonable functions

S Müelich, H Mandry, M Ortmanns… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) produce responses by exploiting randomness that
intrinsically occurs in integrated circuits due to uncontrollable variations in the manufacturing …

Coded modulation and shaping for multivalued physical unclonable functions

RFH Fischer, S Müelich - IEEE Access, 2022 - ieeexplore.ieee.org
In this paper, a coded modulation scheme employing signal shaping is proposed and
designed for use in multi-valued physical unclonable functions (PUFs). In the literature …

The wiretap channel for capacitive PUF-based security enclosures

K Garb, M Xhemrishi, L Kürzinger, C Frisch - arXiv preprint arXiv …, 2022 - arxiv.org
In order to protect devices from physical manipulations, protective security enclosures were
developed. However, these battery-backed solutions come with a reduced lifetime, and have …

Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF

N Stein, M Pehl - International Workshop on Constructive Side-Channel …, 2024 - Springer
In the last years, Physical Unclonable Functions (PUFs) became a popular security primitive,
which is nowadays also used in several products. As a lightweight solution for key storage …

Helper Data Schemes for Coded Modulation and Shaping in Physical Unclonable Functions

RFH Fischer - arXiv preprint arXiv:2402.18980, 2024 - arxiv.org
In this paper, we consider the generation and utilization of helper data for physical
unclonable functions (PUFs) that provide real-valued readout symbols. Compared to …

Fortress: Fortified tamper-resistant envelope with embedded security sensor

K Garb, J Obermaier, E Ferres… - 2021 18th international …, 2021 - ieeexplore.ieee.org
Protecting security modules from attacks on the hardware level presents a very challenging
endeavor since the attacker can manipulate the device directly through physical access. To …