As embedded computers become ubiquitous, mobile and more integrated in connectivity, user dependence on integrated circuits (ICs) increases massively for handling security sensitive tasks as well as processing sensitive information. During this process, hardware authentication is important to prevent unauthorized users or devices from gaining access to secret information. An effective method for hardware authentication is by using physical unclonable function (PUF), which is a hardware design that leverages intrinsic unique physical characteristics of an IC, such as propagation delay, for security authentication in real time. However, PUF is vulnerable to modeling attacks, as one can design an algorithm to imitate PUF functionality at the s...
Physical Unclonable Functions (PUFs) are circuits that exploit chip-unique features to be used as si...
The continued growth of information technology (IT) industry and proliferation of interconnected dev...
Hardware support for security mechanisms such as authentication, cryptographic protocols, digital ri...
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security d...
In the context of hardware systems, authentication refers to the process of confirming the identity ...
Among all the different research lines related to hardware security, there is a particular topic th...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
In the modern era we are moving towards completely connecting many useful electronic devices to each...
For more than a decade and a half, Physical Unclonable Functions (PUFs) have been presented as a pr...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
Hardware-intrinsic security studies cryptographic methods, whose implementations are assisted by som...
We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses ge...
As Internet of Things (IoT) devices are increasingly used in industry and become further integrated ...
Silicon Physical Unclonable Functions (sPUFs) are one of the security primitives and state-of-the-ar...
Physical Unclonable Functions (PUFs) are circuits that exploit chip-unique features to be used as si...
The continued growth of information technology (IT) industry and proliferation of interconnected dev...
Hardware support for security mechanisms such as authentication, cryptographic protocols, digital ri...
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security d...
In the context of hardware systems, authentication refers to the process of confirming the identity ...
Among all the different research lines related to hardware security, there is a particular topic th...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
In the modern era we are moving towards completely connecting many useful electronic devices to each...
For more than a decade and a half, Physical Unclonable Functions (PUFs) have been presented as a pr...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
Hardware-intrinsic security studies cryptographic methods, whose implementations are assisted by som...
We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses ge...
As Internet of Things (IoT) devices are increasingly used in industry and become further integrated ...
Silicon Physical Unclonable Functions (sPUFs) are one of the security primitives and state-of-the-ar...
Physical Unclonable Functions (PUFs) are circuits that exploit chip-unique features to be used as si...
The continued growth of information technology (IT) industry and proliferation of interconnected dev...
Hardware support for security mechanisms such as authentication, cryptographic protocols, digital ri...