The device-unique response of a physically unclonable function (PUF) can serve as the root of trust in an embedded cryptographic system. Fuzzy extractors transform this noisy non-uniformly distributed secret into a stable high-entropy key. The overall efficiency thereof, typically depending on error-correction with a binary [n,k,d] block code, is determined by the universal and well-known (n-k) bound on the min-entropy loss. We derive new considerably tighter bounds for PUF-induced distributions that suffer from, e.g., bias or spatial correlations. The bounds are easy-to-evaluate and apply to large non-trivial codes, e.g., BCH and Reed-Muller codes. Apart from an inherent reduction in implementation footprint, the newly developed theory als...
A physical unclonable function (PUF), like a fingerprint, exploits manufacturing randomness to endow...
PUF-based key generators have been widely considered as a root-of-trust in digital systems. They typ...
© 2016 IEEE. The focus and novelty of this work is the derivation of tight upper bounds on the min-e...
© International Association for Cryptologic Research 2016. The device-unique response of a physicall...
Fuzzy extractors convert noisy signals from the physical world into reliable cryptographic keys. Fu...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy se...
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such ...
informatik.tu-darmstadt.de Abstract—In recent years Physically Unclonable Functions (PUFs) have been...
Fuzzy extractors derive strong keys from noisy sources. Their security is defined information-theore...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost unifo...
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy so...
Fuzzy extractors convert a noisy source of entropy into a consistent uniformly-distributed key. In t...
Fuzzy extractors (Dodis et al., in Advances in cryptology—EUROCRYPT 2014, Springer, Berlin, 2014, pp...
A physical unclonable function (PUF), like a fingerprint, exploits manufacturing randomness to endow...
PUF-based key generators have been widely considered as a root-of-trust in digital systems. They typ...
© 2016 IEEE. The focus and novelty of this work is the derivation of tight upper bounds on the min-e...
© International Association for Cryptologic Research 2016. The device-unique response of a physicall...
Fuzzy extractors convert noisy signals from the physical world into reliable cryptographic keys. Fu...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy se...
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such ...
informatik.tu-darmstadt.de Abstract—In recent years Physically Unclonable Functions (PUFs) have been...
Fuzzy extractors derive strong keys from noisy sources. Their security is defined information-theore...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost unifo...
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy so...
Fuzzy extractors convert a noisy source of entropy into a consistent uniformly-distributed key. In t...
Fuzzy extractors (Dodis et al., in Advances in cryptology—EUROCRYPT 2014, Springer, Berlin, 2014, pp...
A physical unclonable function (PUF), like a fingerprint, exploits manufacturing randomness to endow...
PUF-based key generators have been widely considered as a root-of-trust in digital systems. They typ...
© 2016 IEEE. The focus and novelty of this work is the derivation of tight upper bounds on the min-e...