Cyber-physical systems (CPS) are envisioned to change the whole of society. New engineered systems joining physical and digital solutions are being employed in industry, education, etc. These new systems are networked by default, and private information is shared among the different components related to users, critical infrastructures, or business operations. In this context, it is essential to encrypt those communication links to protect such information. However, even most complicated schemes based on hybrid (asymmetric and symmetric) solutions, finally require physical devices to store a secret key. This approach is cryptographically weak, as any person with physical access to the device could obtain that key. Therefore, in this paper w...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Abstract. With the proliferation of physical attacks that may compromise even the theoretically stro...
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by num...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
Physical systems are becoming increasingly computationally powerful as faster microprocessors are in...
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security d...
Physically unclonable functions (PUFs) are an emerging technology and have been proposed as central ...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
During the last years, Physically Unclonable Functions (PUFs) have become a very important research ...
We address security and privacy problems for digital devices and biometrics from an information-theo...
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physi...
Physically unclonable functions (PUFs) are being proposed as a low-cost alternative to permanently s...
systems whose responses to input stimuli are easy to measure but hard to clone. The unclonability pr...
This paper introduces a novel approach to enhancing cryp- tographic security. It proposes the use of...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Abstract. With the proliferation of physical attacks that may compromise even the theoretically stro...
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by num...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
Physical systems are becoming increasingly computationally powerful as faster microprocessors are in...
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security d...
Physically unclonable functions (PUFs) are an emerging technology and have been proposed as central ...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
During the last years, Physically Unclonable Functions (PUFs) have become a very important research ...
We address security and privacy problems for digital devices and biometrics from an information-theo...
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physi...
Physically unclonable functions (PUFs) are being proposed as a low-cost alternative to permanently s...
systems whose responses to input stimuli are easy to measure but hard to clone. The unclonability pr...
This paper introduces a novel approach to enhancing cryp- tographic security. It proposes the use of...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Abstract. With the proliferation of physical attacks that may compromise even the theoretically stro...
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by num...