Physical unclonable functions (PUFs) have great promise as hardware authentication primitives due to their physical unclonability, high resistance to reverse engineering, and difficulty of mathematical cloning. Strong PUFs are distinguished by an exponentially large number of challenge-response pairs (CRPs), in contrast with weak PUFs that have a smaller CRP set. Because the adversary cannot create an enumeration clone by recording all CRPs even when in physical possession of a PUF, strong PUFs enable secure direct authentication, that does not require cryptography and are thus attractive to low-energy and IoT applications. The first contribution of this dissertation is the design of a strong silicon PUF resistant to machine learning (ML) a...
Date of publication August 15, 2017; date of current version April 19, 2018.Existing strong controll...
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a...
We propose a secure and lightweight key based challenge obfuscation for strong PUFs. Our architectur...
We show in this paper how several proposed Strong Physical Unclonable Functions (PUFs) can be broken...
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by num...
Physical Unclonable Functions (PUFs) are promising security primitives for device authenti-cation an...
Physically unclonable functions (PUFs) are being proposed as a low-cost alternative to permanently s...
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a...
Internet of Things (IoT) is becoming a massive phenomenon in the industry with expectations of trill...
We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses ge...
Silicon Physical Unclonable Functions (PUFs) arose from MIT research more than 15 years ago with gre...
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and stable, an...
Physical Unclonable Functions (PUFs) have not only been suggested as new key storage mechanism, but ...
textSilicon physical unclonable functions (PUFs) are security primitives relying on the intrinsic ra...
Physical unclonable functions (PUFs) have not only been suggested as a new key storage mechanism, bu...
Date of publication August 15, 2017; date of current version April 19, 2018.Existing strong controll...
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a...
We propose a secure and lightweight key based challenge obfuscation for strong PUFs. Our architectur...
We show in this paper how several proposed Strong Physical Unclonable Functions (PUFs) can be broken...
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by num...
Physical Unclonable Functions (PUFs) are promising security primitives for device authenti-cation an...
Physically unclonable functions (PUFs) are being proposed as a low-cost alternative to permanently s...
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a...
Internet of Things (IoT) is becoming a massive phenomenon in the industry with expectations of trill...
We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses ge...
Silicon Physical Unclonable Functions (PUFs) arose from MIT research more than 15 years ago with gre...
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and stable, an...
Physical Unclonable Functions (PUFs) have not only been suggested as new key storage mechanism, but ...
textSilicon physical unclonable functions (PUFs) are security primitives relying on the intrinsic ra...
Physical unclonable functions (PUFs) have not only been suggested as a new key storage mechanism, bu...
Date of publication August 15, 2017; date of current version April 19, 2018.Existing strong controll...
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a...
We propose a secure and lightweight key based challenge obfuscation for strong PUFs. Our architectur...