In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building block for security related scenarios like key storage and authentication. PUFs are physical systems and as such their responses are inherently noisy, precluding a straightforward derivation of cryptographic key material from raw PUF measurements. To overcome this drawback, Fuzzy Extractors are used to eliminate the noise and guarantee robust outputs. A special type are Reverse Fuzzy Extractors, shifting the computational load of error correction towards a computationally powerful verifier. However, the Reverse Fuzzy Extractor reveals error patterns to any eavesdropper, which may cause privacy issues (if the PUF key is drifting, the error patter...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF...
Abstract Physically unclonable functions (PUFs) are becoming popular tools for various applications,...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
informatik.tu-darmstadt.de Abstract—In recent years Physically Unclonable Functions (PUFs) have been...
A physical unclonable function (PUF), like a fingerprint, exploits manufacturing randomness to endow...
© International Association for Cryptologic Research 2016. The device-unique response of a physicall...
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such ...
Herder et al. (IEEE Transactions on Dependable and Secure Computing, 2017) designed a new computatio...
Nowadays, physical tampering and counterfeiting of electronic devices are still an important securit...
Physically Unclonable Functions (PUFs) are becoming popular tools for various applications such as a...
We describe a method of cryptographically-secure key extraction from a noisy biometric source. The c...
A shared cryptographic key enables strong authentication. Candidate sources for creating such a sha...
A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost unifo...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF...
Abstract Physically unclonable functions (PUFs) are becoming popular tools for various applications,...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
informatik.tu-darmstadt.de Abstract—In recent years Physically Unclonable Functions (PUFs) have been...
A physical unclonable function (PUF), like a fingerprint, exploits manufacturing randomness to endow...
© International Association for Cryptologic Research 2016. The device-unique response of a physicall...
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such ...
Herder et al. (IEEE Transactions on Dependable and Secure Computing, 2017) designed a new computatio...
Nowadays, physical tampering and counterfeiting of electronic devices are still an important securit...
Physically Unclonable Functions (PUFs) are becoming popular tools for various applications such as a...
We describe a method of cryptographically-secure key extraction from a noisy biometric source. The c...
A shared cryptographic key enables strong authentication. Candidate sources for creating such a sha...
A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost unifo...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF...
Abstract Physically unclonable functions (PUFs) are becoming popular tools for various applications,...