Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use has been proposed for authentication tokens and anti-counterfeiting. A Controlled PUF (CPUF) consists of a PUF and a control layer that restricts a user's access to the PUF input and output. CPUFs can be used for secure key storage, authentication, certified execution of programs, and certfied measurements. In this paper we modify a number of protocols involving CPUFs in order to improve their security. Our modifications mainly consist of encryption of a larger portion of the message traffic, and additional restrictions on the CPUF accessibility. We simplify the des...
Physical Unclonable Functions (PUFs) are a promis- ing technology to secure low-cost devices. A PUF ...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical Unclonable Functions (PUFs) are a promis- ing technology to secure low-cost devices. A PUF ...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical Unclonable Functions (PUFs) are a promis- ing technology to secure low-cost devices. A PUF ...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical Unclonable Functions (PUFs) are a promis- ing technology to secure low-cost devices. A PUF ...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical Unclonable Functions (PUFs) are a promis- ing technology to secure low-cost devices. A PUF ...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....