Several publications presented tamper-evident Physical Unclonable Functions (PUFs) for secure storage of cryptographic keys and tamper-detection. Unfortunately, previously published PUF-based key derivation schemes do not sufficiently take into account the specifics of the underlying application, i.e., an attacker that tampers with the physical parameters of the PUF outside of an idealized noise error model. This is a notable extension of existing schemes for PUF key derivation, as they are typically concerned about helper data leakage, i.e., by how much the PUF’s entropy is diminished when gaining access to its helper data.To address the specifics of tamper-evident PUFs, we formalize the aspect of tamper-sensitivity, thereby providing a ne...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
PUF-based key generators have been widely considered as a root-of-trust in digital systems. They typ...
Physical Uncloneable Functions (PUFs) can be used as a cost-effective means to store cryptographic k...
Device-specific physical characteristics provide the foundation for Physical Unclonable Functions (P...
Physical Unclonable Functions (PUFs) are an emerging security primitive useful for secure key storag...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
Physical Unclonable Functions (PUFs) are increasingly becoming a well-known security primitive for s...
Abstract. With the proliferation of physical attacks that may compromise even the theoretically stro...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
\u3cp\u3eWhen the applied PUF in a PUF-based key generator does not produce full entropy responses, ...
When the applied PUF in a PUF-based key generator does not produce full entropy responses, informati...
Silicon Physical Unclonable Functions (PUFs) arose from MIT research more than 15 years ago with gre...
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in no...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
PUF-based key generators have been widely considered as a root-of-trust in digital systems. They typ...
Physical Uncloneable Functions (PUFs) can be used as a cost-effective means to store cryptographic k...
Device-specific physical characteristics provide the foundation for Physical Unclonable Functions (P...
Physical Unclonable Functions (PUFs) are an emerging security primitive useful for secure key storag...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
Physical Unclonable Functions (PUFs) are increasingly becoming a well-known security primitive for s...
Abstract. With the proliferation of physical attacks that may compromise even the theoretically stro...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
\u3cp\u3eWhen the applied PUF in a PUF-based key generator does not produce full entropy responses, ...
When the applied PUF in a PUF-based key generator does not produce full entropy responses, informati...
Silicon Physical Unclonable Functions (PUFs) arose from MIT research more than 15 years ago with gre...
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in no...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
PUF-based key generators have been widely considered as a root-of-trust in digital systems. They typ...
Physical Uncloneable Functions (PUFs) can be used as a cost-effective means to store cryptographic k...