© 1982-2012 IEEE. Security-critical products rely on the secrecy and integrity of their cryptographic keys. This is challenging for low-cost resource-constrained embedded devices, with an attacker having physical access to the integrated circuit (IC). Physically, unclonable functions are an emerging technology in this market. They extract bits from unavoidable IC manufacturing variations, remarkably analogous to unique human fingerprints. However, post-processing by helper data algorithms (HDAs) is indispensable to meet the stringent key requirements: reproducibility, high-entropy, and control. The novelty of this paper is threefold. We are the first to provide an in-depth and comprehensive literature overview on HDAs. Second, our analysis ...
Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a har...
Several publications presented tamper-evident Physical Unclonable Functions (PUFs) for secure storag...
Silicon Physical Unclonable Functions (PUFs) arose from MIT research more than 15 years ago with gre...
Physically Unclonable Functions (PUFs) provide a unique signature for integrated circuits (ICs), sim...
PUF-based key generators have been widely considered as a root-of-trust in digital systems. They typ...
Abstract. PUF-based key generators have been widely considered as a root-of-trust in digital systems...
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such ...
When the applied PUF in a PUF-based key generator does not produce full entropy responses, informati...
When the applied PUF in a PUF-based key generator does not produce full entropy responses, informati...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
Abstract. Using a Physically Unclonable Function or PUF to extract a secret key from the unique subm...
Using a Physically Unclonable Function or PUF to extract a secret key from the unique submicron stru...
Open Access: https://ieeexplore.ieee.org/document/9750135International audienceKey exchange protocol...
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in no...
Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a har...
Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a har...
Several publications presented tamper-evident Physical Unclonable Functions (PUFs) for secure storag...
Silicon Physical Unclonable Functions (PUFs) arose from MIT research more than 15 years ago with gre...
Physically Unclonable Functions (PUFs) provide a unique signature for integrated circuits (ICs), sim...
PUF-based key generators have been widely considered as a root-of-trust in digital systems. They typ...
Abstract. PUF-based key generators have been widely considered as a root-of-trust in digital systems...
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such ...
When the applied PUF in a PUF-based key generator does not produce full entropy responses, informati...
When the applied PUF in a PUF-based key generator does not produce full entropy responses, informati...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
Abstract. Using a Physically Unclonable Function or PUF to extract a secret key from the unique subm...
Using a Physically Unclonable Function or PUF to extract a secret key from the unique submicron stru...
Open Access: https://ieeexplore.ieee.org/document/9750135International audienceKey exchange protocol...
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in no...
Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a har...
Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a har...
Several publications presented tamper-evident Physical Unclonable Functions (PUFs) for secure storag...
Silicon Physical Unclonable Functions (PUFs) arose from MIT research more than 15 years ago with gre...