In most PUF-based authentication schemes, a central server is usually engaged to verify the response of the device's PUF to challenge bit-streams. However, the server availability may be intermittent in practice. To tackle such an issue, this paper proposes a new protocol for supporting distributed authentication while avoiding vulnerability to information leakage where CRPs could be retrieved from hacked devices and collectively used to model the PUF. The main idea is to provision for scrambling the challenge bit-stream in a way that is dependent on the verifier. The scrambling pattern varies per authentication round for each device and independently across devices. In essence, the scrambling function becomes node- and packet-specific and ...
A physically unclonable function (PUF) is a circuit of which the input–output behavior is designed t...
Physical unclonable function (PUF), a cryptographic primitive, has recently been used in protocol de...
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in no...
As a lightweight hardware security primitive, physical unclonable functions (PUFs) can provide relia...
Physically Unclonable Functions (PUFs) represent a promising security primitive due to their unclona...
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are i...
Abstract. Physical Unclonable Functions (PUFs), as novel lightweight hardware security primitives, p...
Physical Unclonable Functions (PUFs) are a promis- ing technology to secure low-cost devices. A PUF ...
Physical unclonable function (PUF)-based authentication protocols have been proposed as a strong cha...
In the context of hardware systems, authentication refers to the process of confirming the identity ...
Silicon Physical Unclonable Functions (PUFs) arose from MIT research more than 15 years ago with gre...
We show in this paper how several proposed Strong Physical Unclonable Functions (PUFs) can be broken...
© 2015 IEEE. We present a lightweight PUF-based authentication approach that is practical in setting...
This paper describes an authentication protocol using a Hardware-Embedded Delay PUF called HELP. HEL...
The widespread adoption of Internet of Things (IoT) devices in various application domains has signi...
A physically unclonable function (PUF) is a circuit of which the input–output behavior is designed t...
Physical unclonable function (PUF), a cryptographic primitive, has recently been used in protocol de...
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in no...
As a lightweight hardware security primitive, physical unclonable functions (PUFs) can provide relia...
Physically Unclonable Functions (PUFs) represent a promising security primitive due to their unclona...
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are i...
Abstract. Physical Unclonable Functions (PUFs), as novel lightweight hardware security primitives, p...
Physical Unclonable Functions (PUFs) are a promis- ing technology to secure low-cost devices. A PUF ...
Physical unclonable function (PUF)-based authentication protocols have been proposed as a strong cha...
In the context of hardware systems, authentication refers to the process of confirming the identity ...
Silicon Physical Unclonable Functions (PUFs) arose from MIT research more than 15 years ago with gre...
We show in this paper how several proposed Strong Physical Unclonable Functions (PUFs) can be broken...
© 2015 IEEE. We present a lightweight PUF-based authentication approach that is practical in setting...
This paper describes an authentication protocol using a Hardware-Embedded Delay PUF called HELP. HEL...
The widespread adoption of Internet of Things (IoT) devices in various application domains has signi...
A physically unclonable function (PUF) is a circuit of which the input–output behavior is designed t...
Physical unclonable function (PUF), a cryptographic primitive, has recently been used in protocol de...
A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in no...