© International Association for Cryptologic Research 2016. The device-unique response of a physically unclonable function (PUF) can serve as the root of trust in an embedded cryptographic system. Fuzzy extractors transform this noisy non-uniformly distributed secret into a stable high-entropy key. The overall efficiency thereof, typically depending on error-correction with a binary [n, k, d] block code, is determined by the universal and well-known (n − k) bound on the min-entropy loss. We derive new considerably tighter bounds for PUFinduced distributions that suffer from, e.g., bias or spatial correlations. The bounds are easy-to-evaluate and apply to large non-trivial codes, e.g., BCH, Hamming and Reed-Muller codes. Apart from an inheren...
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar...
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar...
© 2016 IEEE. The focus and novelty of this work is the derivation of tight upper bounds on the min-e...
The device-unique response of a physically unclonable function (PUF) can serve as the root of trust ...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
informatik.tu-darmstadt.de Abstract—In recent years Physically Unclonable Functions (PUFs) have been...
Fuzzy extractors convert a noisy source of entropy into a consistent uniformly-distributed key. In t...
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy se...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
Fuzzy extractors (Dodis et al., in Advances in cryptology—EUROCRYPT 2014, Springer, Berlin, 2014, pp...
A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost unifo...
Fuzzy extractors derive strong keys from noisy sources. Their security is defined information-theore...
A physical unclonable function (PUF), like a fingerprint, exploits manufacturing randomness to endow...
We describe a method of cryptographically-secure key extraction from a noisy biometric source. The c...
Fuzzy extractors convert noisy signals from the physical world into reliable cryptographic keys. Fu...
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar...
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar...
© 2016 IEEE. The focus and novelty of this work is the derivation of tight upper bounds on the min-e...
The device-unique response of a physically unclonable function (PUF) can serve as the root of trust ...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
informatik.tu-darmstadt.de Abstract—In recent years Physically Unclonable Functions (PUFs) have been...
Fuzzy extractors convert a noisy source of entropy into a consistent uniformly-distributed key. In t...
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy se...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
Fuzzy extractors (Dodis et al., in Advances in cryptology—EUROCRYPT 2014, Springer, Berlin, 2014, pp...
A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost unifo...
Fuzzy extractors derive strong keys from noisy sources. Their security is defined information-theore...
A physical unclonable function (PUF), like a fingerprint, exploits manufacturing randomness to endow...
We describe a method of cryptographically-secure key extraction from a noisy biometric source. The c...
Fuzzy extractors convert noisy signals from the physical world into reliable cryptographic keys. Fu...
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar...
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar...
© 2016 IEEE. The focus and novelty of this work is the derivation of tight upper bounds on the min-e...