In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building block for security related scenarios like key storage and authentication. PUFs are physical systems and as such their responses are inherently noisy, precluding a straightforward derivation of cryptographic key material from raw PUF measurements. To overcome this drawback, Fuzzy Extractors are used to eliminate the noise and guarantee robust outputs. A special type are Reverse Fuzzy Extractors, shifting the computational load of error correction towards a computationally powerful verifier. However, the Reverse Fuzzy Extractor reveals error patterns to any eavesdropper, which may cause privacy issues (if the PUF key is drifting, the error patter...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF...
Abstract Physically unclonable functions (PUFs) are becoming popular tools for various applications,...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
informatik.tu-darmstadt.de Abstract—In recent years Physically Unclonable Functions (PUFs) have been...
A physical unclonable function (PUF), like a fingerprint, exploits manufacturing randomness to endow...
The device-unique response of a physically unclonable function (PUF) can serve as the root of trust ...
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such ...
Herder et al. (IEEE Transactions on Dependable and Secure Computing, 2017) designed a new computatio...
We describe a method of cryptographically-secure key extraction from a noisy biometric source. The c...
Nowadays, physical tampering and counterfeiting of electronic devices are still an important securit...
Physically Unclonable Functions (PUFs) are becoming popular tools for various applications such as a...
A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost unifo...
A shared cryptographic key enables strong authentication. Candidate sources for creating such a sha...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF...
Abstract Physically unclonable functions (PUFs) are becoming popular tools for various applications,...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
informatik.tu-darmstadt.de Abstract—In recent years Physically Unclonable Functions (PUFs) have been...
A physical unclonable function (PUF), like a fingerprint, exploits manufacturing randomness to endow...
The device-unique response of a physically unclonable function (PUF) can serve as the root of trust ...
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such ...
Herder et al. (IEEE Transactions on Dependable and Secure Computing, 2017) designed a new computatio...
We describe a method of cryptographically-secure key extraction from a noisy biometric source. The c...
Nowadays, physical tampering and counterfeiting of electronic devices are still an important securit...
Physically Unclonable Functions (PUFs) are becoming popular tools for various applications such as a...
A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost unifo...
A shared cryptographic key enables strong authentication. Candidate sources for creating such a sha...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF...
Abstract Physically unclonable functions (PUFs) are becoming popular tools for various applications,...