© 2015 ACM 0360-0300/2015/10-ART26 s15.00. Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of an Integrated Circuit (IC). Their input-output behavior serves as a unique IC "fingerprint." Therefore, they have been envisioned as an IC authentication mechanism, in particular the subclass of so-called strong PUFs. The protocol proposals are typically accompanied with two PUF promises: lightweight and an increased resistance against physical attacks. In this work, we review 19 proposals in chronological order: from the original strong PUF proposal (2001) to the more complicated noise bifurcation and system of PUF proposals (2014). The assessment is aided by a unified notation and a transparent framework of...
Physical Unclonable Functions (PUFs) have emerged as a promising primitive that can be used to provi...
Physically unclonable functions (PUFs) are an emerging technology and have been proposed as central ...
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security d...
Abstract. Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of...
© International Association for Cryptologic Research 2014. Physically unclonable functions (PUFs) ex...
Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a har...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a har...
We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses gene...
Physical Unclonable Functions (PUFs) have emerged as a promising primitive that can be used to provi...
Physically unclonable functions (PUFs) are an emerging technology and have been proposed as central ...
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security d...
Abstract. Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of...
© International Association for Cryptologic Research 2014. Physically unclonable functions (PUFs) ex...
Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a har...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a har...
We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses gene...
Physical Unclonable Functions (PUFs) have emerged as a promising primitive that can be used to provi...
Physically unclonable functions (PUFs) are an emerging technology and have been proposed as central ...
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security d...