Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic key material in an unclonable way. They can be employed for strong authentication of objects, e.g., tokens, and of persons possessing such tokens, but also for other purposes. We give a short overview of security applications where PUFs are useful, and discuss physical realisations, noisy measurements and information content of PUFs. Then we describe an integrated authentication token containing an optical PUF, a challenging mechanism and a detector. Finally, we discuss authentication protocols for controlled and uncontrolled PUFs
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
A PUF or physical unclonable function is a function that is embodied in a physical structure that co...
A PUF or physical unclonable function is a function that is embodied in a physical structure that co...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physically unclonable functions (PUFs) are an emerging technology and have been proposed as central ...
© International Association for Cryptologic Research 2014. Physically unclonable functions (PUFs) ex...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
© 2015 ACM 0360-0300/2015/10-ART26 s15.00. Physically unclonable functions (PUFs) exploit the unavoi...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
A PUF or physical unclonable function is a function that is embodied in a physical structure that co...
A PUF or physical unclonable function is a function that is embodied in a physical structure that co...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physical unclonable functions (PUFs) can be used as a cost-effective means to store cryptographic ke...
Physically unclonable functions (PUFs) are an emerging technology and have been proposed as central ...
© International Association for Cryptologic Research 2014. Physically unclonable functions (PUFs) ex...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
In this chapter we explain why security is important in an ambient intelligent (AmI) environment. In...
© 2015 ACM 0360-0300/2015/10-ART26 s15.00. Physically unclonable functions (PUFs) exploit the unavoi...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable an...
Physical attacks against cryptographic devices typically take advantage of information leakage (e.g....
A PUF or physical unclonable function is a function that is embodied in a physical structure that co...
A PUF or physical unclonable function is a function that is embodied in a physical structure that co...