Physical Unclonable Functions (PUFs) are promising security primitives for resource-constrained IoT devices. A critical aspect of PUF security research is to identify all potential security risks. This information about vulnerabilities is beneficial for both PUF developers and PUF-using application developers in terms of designing new PUFs to mitigate existing risks and avoid vulnerable PUFs. Recently, a PUF structure called Interpose PUF (IPUF) was proposed, which claims to be resistant to reliability attacks and machine learning modeling attacks. Related studies on this secure PUF design have demonstrated that some IPUFs can still be broken, but large IPUFs may remain secure against all known modeling attacks. In addition, all these studi...
Physical Unclonable Functions (PUFs) are a promis- ing technology to secure low-cost devices. A PUF ...
Abstract. A Physically Unclonable Function (PUF) can be seen as a source of randomness that can be c...
have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key n...
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and stable, an...
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a...
The widespread adoption of Internet of Things (IoT) devices in various application domains has signi...
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a...
We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based design for so-call...
We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based design for so-call...
The developments in the areas of strong Physical Unclonable Functions (PUFs) predicate an ongoing st...
Abstract. Physical Unclonable Functions (PUFs), as novel lightweight hardware security primitives, p...
A physically unclonable function (PUF) is a circuit of which the input–output behavior is designed t...
As a lightweight hardware security primitive, physical unclonable functions (PUFs) can provide relia...
We show in this paper how several proposed Strong Physical Unclonable Functions (PUFs) can be broken...
Physical Unclonable Functions (PUFs) have been designed for many security applications such as ident...
Physical Unclonable Functions (PUFs) are a promis- ing technology to secure low-cost devices. A PUF ...
Abstract. A Physically Unclonable Function (PUF) can be seen as a source of randomness that can be c...
have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key n...
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and stable, an...
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a...
The widespread adoption of Internet of Things (IoT) devices in various application domains has signi...
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a...
We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based design for so-call...
We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based design for so-call...
The developments in the areas of strong Physical Unclonable Functions (PUFs) predicate an ongoing st...
Abstract. Physical Unclonable Functions (PUFs), as novel lightweight hardware security primitives, p...
A physically unclonable function (PUF) is a circuit of which the input–output behavior is designed t...
As a lightweight hardware security primitive, physical unclonable functions (PUFs) can provide relia...
We show in this paper how several proposed Strong Physical Unclonable Functions (PUFs) can be broken...
Physical Unclonable Functions (PUFs) have been designed for many security applications such as ident...
Physical Unclonable Functions (PUFs) are a promis- ing technology to secure low-cost devices. A PUF ...
Abstract. A Physically Unclonable Function (PUF) can be seen as a source of randomness that can be c...
have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key n...