We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses generated from a Strong Physical Unclonable Function (PUF). The new method is lightweight, and suitable for energy constrained platforms such as ultra-low power embedded systems for use in identification and authentication applications. The proposed protocol does not follow the classic paradigm of exposing the full PUF responses (or a transformation of the full string of responses) on the communication channel. Instead, random subsets of the responses are revealed and sent for authentication. The response patterns are used for authenticating the prover device with a very high probability. We perform a thorough analysis of the method’s resiliency ...
Physical unclonable function (PUF), a cryptographic primitive, has recently been used in protocol de...
Abstract. Physical Unclonable Functions (PUFs), as novel lightweight hardware security primitives, p...
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in no...
We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses ge...
As a lightweight hardware security primitive, physical unclonable functions (PUFs) can provide relia...
© 2015 IEEE. We present a lightweight PUF-based authentication approach that is practical in setting...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
© 2015 ACM 0360-0300/2015/10-ART26 s15.00. Physically unclonable functions (PUFs) exploit the unavoi...
Building lightweight security for low-cost pervasivedevices is a major challenge considering the des...
© International Association for Cryptologic Research 2014. Physically unclonable functions (PUFs) ex...
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are i...
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are i...
We present a lightweight PUF-based authentication approach that is practical in settings where a ser...
Abstract. Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of...
Physical unclonable function (PUF), a cryptographic primitive, has recently been used in protocol de...
Abstract. Physical Unclonable Functions (PUFs), as novel lightweight hardware security primitives, p...
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in no...
We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses ge...
As a lightweight hardware security primitive, physical unclonable functions (PUFs) can provide relia...
© 2015 IEEE. We present a lightweight PUF-based authentication approach that is practical in setting...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
© 2015 ACM 0360-0300/2015/10-ART26 s15.00. Physically unclonable functions (PUFs) exploit the unavoi...
Building lightweight security for low-cost pervasivedevices is a major challenge considering the des...
© International Association for Cryptologic Research 2014. Physically unclonable functions (PUFs) ex...
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are i...
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are i...
We present a lightweight PUF-based authentication approach that is practical in settings where a ser...
Abstract. Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of...
Physical unclonable function (PUF), a cryptographic primitive, has recently been used in protocol de...
Abstract. Physical Unclonable Functions (PUFs), as novel lightweight hardware security primitives, p...
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in no...