Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …
and so on represent a thriving surface for several security attacks with economic …
A survey on silicon PUFs and recent advances in ring oscillator PUFs
Silicon physical unclonable function (PUF) is a popular hardware security primitive that
exploits the intrinsic variation of IC manufacturing process to generate chip-unique …
exploits the intrinsic variation of IC manufacturing process to generate chip-unique …
[KNJIGA][B] Physically unclonable functions: Concept and constructions
R Maes, R Maes - 2013 - Springer
This chapter introduces the reader to the basic concept of a physically unclonable function
or PUF. Many research results on this topic were published over recent years in a variety of …
or PUF. Many research results on this topic were published over recent years in a variety of …
PUFKY: A fully functional PUF-based cryptographic key generator
We present PUFKY: a practical and modular design for a cryptographic key generator based
on a Physically Unclonable Function (PUF). A fully functional reference implementation is …
on a Physically Unclonable Function (PUF). A fully functional reference implementation is …
An aging-resistant RO-PUF for reliable key generation
Physical unclonable functions (PUFs) have emerged as a promising security primitive for
low-cost authentication and cryptographic key generation. However, PUF stability with …
low-cost authentication and cryptographic key generation. However, PUF stability with …
A formalization of the security features of physical functions
Physical attacks against cryptographic devices typically take advantage of information
leakage (eg, side-channels attacks) or erroneous computations (eg, fault injection attacks) …
leakage (eg, side-channels attacks) or erroneous computations (eg, fault injection attacks) …
Homogeneous and heterogeneous feed-forward XOR physical unclonable functions
Physical unclonable functions (PUFs) are hardware security primitives that are used for
device authentication and cryptographic key generation. Standard XOR PUFs typically …
device authentication and cryptographic key generation. Standard XOR PUFs typically …
Security based on physical unclonability and disorder
Identification, authentication, and integrity checking are important tasks for ensuring the
security and protection of valuable objects, devices, programs, and data. The utilization of …
security and protection of valuable objects, devices, programs, and data. The utilization of …
A robust physical unclonable function with enhanced challenge-response set
A Physical Unclonable Function (PUF) is a promising solution to many security issues due
its ability to generate a die unique identifier that can resist cloning attempts as well as …
its ability to generate a die unique identifier that can resist cloning attempts as well as …
Reliable and efficient PUF-based key generation using pattern matching
Z Paral, S Devadas - … on hardware-oriented security and trust, 2011 - ieeexplore.ieee.org
We describe a novel and efficient method to reliably provision and re-generate a finite and
exact sequence of bits, for use with cryptographic applications, eg, as a key, by employing …
exact sequence of bits, for use with cryptographic applications, eg, as a key, by employing …