The device-unique response of a physically unclonable function (PUF) can serve as the root of trust in an embedded cryptographic system. Fuzzy extractors transform this noisy non-uniformly distributed secret into a stable high-entropy key. The overall efficiency thereof, typically depending on error-correction with a binary [n; k; d] block code, is determined by the universal and well-known (n - k) bound on the min-entropy loss. We derive new considerably tighter bounds for PUF-induced distributions that suffer from, e.g., bias or spatial correlations. The bounds are easy-to-evaluate and apply to large non-trivial codes, e.g., BCH, Hamming and Reed-Muller codes. Apart from an inherent reduction in implementation footprint, the newly develo...
© 2016 IEEE. The focus and novelty of this work is the derivation of tight upper bounds on the min-e...
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar...
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar...
© International Association for Cryptologic Research 2016. The device-unique response of a physicall...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
informatik.tu-darmstadt.de Abstract—In recent years Physically Unclonable Functions (PUFs) have been...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
Fuzzy extractors convert a noisy source of entropy into a consistent uniformly-distributed key. In t...
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy se...
A physical unclonable function (PUF), like a fingerprint, exploits manufacturing randomness to endow...
Fuzzy extractors derive strong keys from noisy sources. Their security is defined information-theore...
A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost unifo...
We describe a method of cryptographically-secure key extraction from a noisy biometric source. The c...
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such ...
Fuzzy extractors (Dodis et al., in Advances in cryptology—EUROCRYPT 2014, Springer, Berlin, 2014, pp...
© 2016 IEEE. The focus and novelty of this work is the derivation of tight upper bounds on the min-e...
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar...
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar...
© International Association for Cryptologic Research 2016. The device-unique response of a physicall...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
informatik.tu-darmstadt.de Abstract—In recent years Physically Unclonable Functions (PUFs) have been...
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building bl...
Fuzzy extractors convert a noisy source of entropy into a consistent uniformly-distributed key. In t...
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy se...
A physical unclonable function (PUF), like a fingerprint, exploits manufacturing randomness to endow...
Fuzzy extractors derive strong keys from noisy sources. Their security is defined information-theore...
A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost unifo...
We describe a method of cryptographically-secure key extraction from a noisy biometric source. The c...
Physical Unclonable Functions (PUFs) are used in various key-generation schemes and protocols. Such ...
Fuzzy extractors (Dodis et al., in Advances in cryptology—EUROCRYPT 2014, Springer, Berlin, 2014, pp...
© 2016 IEEE. The focus and novelty of this work is the derivation of tight upper bounds on the min-e...
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar...
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar...