Physical unclonable functions and applications: A tutorial
C Herder, MD Yu, F Koushanfar… - Proceedings of the …, 2014 - ieeexplore.ieee.org
This paper describes the use of physical unclonable functions (PUFs) in low-cost
authentication and key generation applications. First, it motivates the use of PUFs versus …
authentication and key generation applications. First, it motivates the use of PUFs versus …
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …
and so on represent a thriving surface for several security attacks with economic …
Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain
As the electronic component supply chain grows more complex due to globalization, with
parts coming from a diverse set of suppliers, counterfeit electronics have become a major …
parts coming from a diverse set of suppliers, counterfeit electronics have become a major …
Physical unclonable functions
A physical unclonable function (PUF) is a device that exploits inherent randomness
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …
PUF modeling attacks on simulated and silicon data
We discuss numerical modeling attacks on several proposed strong physical unclonable
functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal …
functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal …
[图书][B] Physically unclonable functions: Concept and constructions
R Maes, R Maes - 2013 - Springer
This chapter introduces the reader to the basic concept of a physically unclonable function
or PUF. Many research results on this topic were published over recent years in a variety of …
or PUF. Many research results on this topic were published over recent years in a variety of …
Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to
provide unique identities to billions of connected devices in Internet of Things (IoTs). In …
provide unique identities to billions of connected devices in Internet of Things (IoTs). In …
Parallel tracking and mapping for small AR workspaces
This paper presents a method of estimating camera pose in an unknown scene. While this
has previously been attempted by adapting SLAM algorithms developed for robotic …
has previously been attempted by adapting SLAM algorithms developed for robotic …
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be
broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a …
broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a …
Physical unclonable functions for device authentication and secret key generation
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …
from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit …