Physical Unclonable Functions (PUFs) are promising security primitives for device authenti-cation and key generation. Due to the noise influence, reliability is an important performance metric of PUF-based authentication. In the literature, lots of efforts have been devoted to enhancing PUF reliability by using error correction methods such as error-correcting codes and fuzzy extractor. Ho-wever, one property that most of these prior works overlooked is the non-uniform distribution of PUF response across different bits. This wok proposes a two-step methodology to improve the reliability of PUF under noisy conditions. The first step involves acquiring the parameters of PUF models by using machine lear-ning algorithms. The second step then utiliz...
In the context of hardware systems, authentication refers to the process of confirming the identity ...
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by num...
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such ...
Physical Unclonable Functions (PUFs) are promising security primitives for device authenti-cation an...
Silicon Physical Unclonable Functions (PUFs) arose from MIT research more than 15 years ago with gre...
Physical unclonable functions (PUFs) have great promise as hardware authentication primitives due to...
We present a lightweight PUF-based authentication approach that is practical in settings where a ser...
Physically Unclonable Function (PUF) is a cryptographic primitive that is based on physical property...
Model building attack on Physical Unclonable Functions (PUFs) by using machine learning (ML) techniq...
University of Minnesota M.S.E.E. thesis.May 2019. Major: Electrical/Computer Engineering. Advisor: ...
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a...
We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses ge...
Abstract. Physical Unclonable Functions (PUFs) are seen as a promis-ing alternative to traditional c...
We show in this paper how several proposed Strong Physical Unclonable Functions (PUFs) can be broken...
As a lightweight hardware security primitive, physical unclonable functions (PUFs) can provide relia...
In the context of hardware systems, authentication refers to the process of confirming the identity ...
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by num...
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such ...
Physical Unclonable Functions (PUFs) are promising security primitives for device authenti-cation an...
Silicon Physical Unclonable Functions (PUFs) arose from MIT research more than 15 years ago with gre...
Physical unclonable functions (PUFs) have great promise as hardware authentication primitives due to...
We present a lightweight PUF-based authentication approach that is practical in settings where a ser...
Physically Unclonable Function (PUF) is a cryptographic primitive that is based on physical property...
Model building attack on Physical Unclonable Functions (PUFs) by using machine learning (ML) techniq...
University of Minnesota M.S.E.E. thesis.May 2019. Major: Electrical/Computer Engineering. Advisor: ...
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a...
We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses ge...
Abstract. Physical Unclonable Functions (PUFs) are seen as a promis-ing alternative to traditional c...
We show in this paper how several proposed Strong Physical Unclonable Functions (PUFs) can be broken...
As a lightweight hardware security primitive, physical unclonable functions (PUFs) can provide relia...
In the context of hardware systems, authentication refers to the process of confirming the identity ...
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by num...
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such ...