Cryptographic systems control access to protected assets using keys stored in non-volatile digital memory which is vulnerable to tampering, substitution, and duplication. These key storage solutions require countermeasures that increase cost and complexity thus making their practical scalability to low-end systems intractable. Stored keys are usually derived from algorithms which include hash functions, random sequences, one-way permutations, and ciphers. Such approaches rely on computational asymmetry, e.g. algorithms that are easy to compute, yet difficult to reverse. However, the security of such “one-way” functions is not rigorously proven. Physical keys store private information within the physical structure of an object to protect aga...
Physical unclonable functions (PUFs) are complex physical objects that aim at overcoming the vulnera...
Modern authentication and communication protocols increasingly use physical keys in lieu of conventi...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Traditional security algorithms for authentication and encryption rely heavily on the digital storag...
Protecting confidential data is a major worldwide challenge. Classical cryptography is fast and scal...
Secure communication is of paramount importance in modern society. Asymmetric cryptography methods s...
Secure communication is of paramount importance in modern society. Asymmetric cryptography methods s...
This paper presents an optical method of storing random cryptographic keys within a reconfigurable v...
We present a device to optically access gigabits of random keys stored within an object’s microscopi...
International audienceWe propose a scheme for authentication of physical keys that are materialized ...
We present an optical method of storing random cryptographic keys, at high densities, within an elec...
Authentication of persons and objects is a crucial aspect of security. We experimentally demonstrate...
Physical unclonable functions (PUFs) are complex physical objects that aim at overcoming the vulnera...
Modern authentication and communication protocols increasingly use physical keys in lieu of conventi...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Traditional security algorithms for authentication and encryption rely heavily on the digital storag...
Protecting confidential data is a major worldwide challenge. Classical cryptography is fast and scal...
Secure communication is of paramount importance in modern society. Asymmetric cryptography methods s...
Secure communication is of paramount importance in modern society. Asymmetric cryptography methods s...
This paper presents an optical method of storing random cryptographic keys within a reconfigurable v...
We present a device to optically access gigabits of random keys stored within an object’s microscopi...
International audienceWe propose a scheme for authentication of physical keys that are materialized ...
We present an optical method of storing random cryptographic keys, at high densities, within an elec...
Authentication of persons and objects is a crucial aspect of security. We experimentally demonstrate...
Physical unclonable functions (PUFs) are complex physical objects that aim at overcoming the vulnera...
Modern authentication and communication protocols increasingly use physical keys in lieu of conventi...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...