Physical unclonable functions (PUFs) are complex physical objects that aim at overcoming the vulnerabilities of traditional cryptographic keys, promising a robust class of security primitives for different applications. Optical PUFs present advantages over traditional electronic realizations, namely, a stronger unclonability, but suffer from problems of reliability and weak unpredictability of the key. We here develop a two-step PUF generation strategy based on deep learning, which associates reliable keys verified against the National Institute of Standards and Technology (NIST) certification standards of true random generators for cryptography. The idea explored in this work is to decouple the design of the PUFs from the key generation an...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Funding: C.C. acknowledges funding from Horizon 2020 Framework Programme QuantERA grant QUOMPLEX, by...
Traditional security algorithms for authentication and encryption rely heavily on the digital storag...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
Increasing the performance of a security system to reduce risk is an important task in many applicat...
Physical unclonable functions (PUFs) have been developed as promising strategies for secure authent...
In recent years, physically unclonable functions (PUFs) have gained significant attraction in IoT se...
Information security has witnessed a tremendous growth in the last decade, covering a wide range of ...
In recent years, physically unclonable functions (PUFs) have gained significant attraction in IoT se...
In recent years, physically unclonable functions (PUFs) have gained significant attraction in IoT se...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Funding: C.C. acknowledges funding from Horizon 2020 Framework Programme QuantERA grant QUOMPLEX, by...
Traditional security algorithms for authentication and encryption rely heavily on the digital storag...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
Increasing the performance of a security system to reduce risk is an important task in many applicat...
Physical unclonable functions (PUFs) have been developed as promising strategies for secure authent...
In recent years, physically unclonable functions (PUFs) have gained significant attraction in IoT se...
Information security has witnessed a tremendous growth in the last decade, covering a wide range of ...
In recent years, physically unclonable functions (PUFs) have gained significant attraction in IoT se...
In recent years, physically unclonable functions (PUFs) have gained significant attraction in IoT se...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...