The internet of things (IoT) describes the network of physical objects equipped with sensors and other technologies to exchange data with other devices over the Internet. Due to its inherent flexibility, field-programmable gate array (FPGA) has become a viable platform for IoT development. However, various security threats such as FPGA bitstream cloning and intellectual property (IP) piracy have become a major concern for this device. Physical unclonable function (PUF) is a promising hardware fingerprinting technology to solve the above problems. Several PUFs have been proposed, including the implementation of reconfigurable-XOR PUF (R-XOR PUF) and multiPUF (MPUF) on the FPGA. However, these proposed PUFs have drawbacks, such as high delay ...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
The paper presents a new architecture of symmetric paths of the arbiter PUF, providing efficient use...
The security of service, confidential data, and intellectual property are threatened by physical att...
Physical Unclonable Function (PUF) has now become a core lightweight hardware-intrinsic cryptographi...
The Physically Unclonable Function (PUF) is gaining increasing interest for its potential use as a h...
As modern technology has advanced progressively throughout the years, things are getting increasing...
Abstract—Physically unclonable functions (PUFs) have been a hot research topic in hardware-oriented ...
Abstract — The concept of having an integrated circuit (IC) generate its own unique digital signatur...
Physical Unclonable Functions (PUF) are used for authentication and key generation to obtain a uniqu...
Physical cryptography is one of the current trends among the existing methods of protecting digital ...
The rapid growth of small form, mobile, and remote sensor network systems require secure and ultralo...
Physically unclonable functions are used for IP protection, hardware authentication and su...
The last 25 years have witnessed an exponential growth of the number of devices connected to the Int...
Cryptographic and authentication applications in application-specific integrated circuits (ASICs) an...
The widespread adoption of Internet of Things (IoT) devices in various application domains has signi...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
The paper presents a new architecture of symmetric paths of the arbiter PUF, providing efficient use...
The security of service, confidential data, and intellectual property are threatened by physical att...
Physical Unclonable Function (PUF) has now become a core lightweight hardware-intrinsic cryptographi...
The Physically Unclonable Function (PUF) is gaining increasing interest for its potential use as a h...
As modern technology has advanced progressively throughout the years, things are getting increasing...
Abstract—Physically unclonable functions (PUFs) have been a hot research topic in hardware-oriented ...
Abstract — The concept of having an integrated circuit (IC) generate its own unique digital signatur...
Physical Unclonable Functions (PUF) are used for authentication and key generation to obtain a uniqu...
Physical cryptography is one of the current trends among the existing methods of protecting digital ...
The rapid growth of small form, mobile, and remote sensor network systems require secure and ultralo...
Physically unclonable functions are used for IP protection, hardware authentication and su...
The last 25 years have witnessed an exponential growth of the number of devices connected to the Int...
Cryptographic and authentication applications in application-specific integrated circuits (ASICs) an...
The widespread adoption of Internet of Things (IoT) devices in various application domains has signi...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
The paper presents a new architecture of symmetric paths of the arbiter PUF, providing efficient use...
The security of service, confidential data, and intellectual property are threatened by physical att...