Review of error correction for PUFs and evaluation on state-of-the-art FPGAs
M Hiller, L Kürzinger, G Sigl - Journal of cryptographic engineering, 2020 - Springer
Efficient error correction and key derivation is a prerequisite to generate secure and reliable
keys from PUFs. The most common methods can be divided into linear schemes and pointer …
keys from PUFs. The most common methods can be divided into linear schemes and pointer …
Impedanceverif: On-chip impedance sensing for system-level tampering detection
Physical attacks can compromise the security of cryptographic devices. Depending on the
attack's requirements, adversaries might need to (i) place probes in the proximity of the …
attack's requirements, adversaries might need to (i) place probes in the proximity of the …
Interleaved challenge loop PUF: a highly side-channel protected oscillator-based PUF
Physical Unclonable Functions (PUFs) leverage manufacturing variations to generate
device-specific keys during runtime only, overcoming the need for protection after power-off …
device-specific keys during runtime only, overcoming the need for protection after power-off …
A SC PUF standard cell used for key generation and anti-invasive-attack protection
Y Zhang, Z He, M Wan, J Liu, H Gu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
By using metal blocks as the protective coating, placing the sensitive signals in last but
second metal (LSM), integrating a low-cost one-time programming (OTP) cell in each PUF …
second metal (LSM), integrating a low-cost one-time programming (OTP) cell in each PUF …
A multilevel coding scheme for multi-valued physical unclonable functions
S Müelich, H Mandry, M Ortmanns… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) produce responses by exploiting randomness that
intrinsically occurs in integrated circuits due to uncontrollable variations in the manufacturing …
intrinsically occurs in integrated circuits due to uncontrollable variations in the manufacturing …
Coded modulation and shaping for multivalued physical unclonable functions
RFH Fischer, S Müelich - IEEE Access, 2022 - ieeexplore.ieee.org
In this paper, a coded modulation scheme employing signal shaping is proposed and
designed for use in multi-valued physical unclonable functions (PUFs). In the literature …
designed for use in multi-valued physical unclonable functions (PUFs). In the literature …
The wiretap channel for capacitive PUF-based security enclosures
K Garb, M Xhemrishi, L Kürzinger, C Frisch - arXiv preprint arXiv …, 2022 - arxiv.org
In order to protect devices from physical manipulations, protective security enclosures were
developed. However, these battery-backed solutions come with a reduced lifetime, and have …
developed. However, these battery-backed solutions come with a reduced lifetime, and have …
Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF
N Stein, M Pehl - International Workshop on Constructive Side-Channel …, 2024 - Springer
In the last years, Physical Unclonable Functions (PUFs) became a popular security primitive,
which is nowadays also used in several products. As a lightweight solution for key storage …
which is nowadays also used in several products. As a lightweight solution for key storage …
Helper Data Schemes for Coded Modulation and Shaping in Physical Unclonable Functions
RFH Fischer - arXiv preprint arXiv:2402.18980, 2024 - arxiv.org
In this paper, we consider the generation and utilization of helper data for physical
unclonable functions (PUFs) that provide real-valued readout symbols. Compared to …
unclonable functions (PUFs) that provide real-valued readout symbols. Compared to …
Fortress: Fortified tamper-resistant envelope with embedded security sensor
K Garb, J Obermaier, E Ferres… - 2021 18th international …, 2021 - ieeexplore.ieee.org
Protecting security modules from attacks on the hardware level presents a very challenging
endeavor since the attacker can manipulate the device directly through physical access. To …
endeavor since the attacker can manipulate the device directly through physical access. To …