Physical unclonable functions and applications: A tutorial
C Herder, MD Yu, F Koushanfar… - Proceedings of the …, 2014 - ieeexplore.ieee.org
This paper describes the use of physical unclonable functions (PUFs) in low-cost
authentication and key generation applications. First, it motivates the use of PUFs versus …
authentication and key generation applications. First, it motivates the use of PUFs versus …
Taxonomy and challenges of out-of-band signal injection attacks and defenses
I Giechaskiel, K Rasmussen - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Recent research has shown that the integrity of sensor measurements can be violated
through out-of-band signal injection attacks. These attacks target the conversion process …
through out-of-band signal injection attacks. These attacks target the conversion process …
On the design of hardware building blocks for modern lattice-based encryption schemes
N Göttert, T Feller, M Schneider, J Buchmann… - … and Embedded Systems …, 2012 - Springer
We present both a hardware and a software implementation variant of the learning with
errors (LWE) based cryptosystem presented by Lindner and Peikert. This work helps in …
errors (LWE) based cryptosystem presented by Lindner and Peikert. This work helps in …
An all-digital edge racing true random number generator robust against PVT variations
This paper presents an all-digital true random number generator (TRNG) harvesting entropy
from the collapse of two edges injected into one even-stage ring, fabricated in 40 and 180 …
from the collapse of two edges injected into one even-stage ring, fabricated in 40 and 180 …
16.3 A 23Mb/s 23pJ/b fully synthesized true-random-number generator in 28nm and 65nm CMOS
True random number generators (TRNGs) use physical randomness as entropy sources and
are heavily used in cryptography and security [1]. Although hardware TRNGs provide …
are heavily used in cryptography and security [1]. Although hardware TRNGs provide …
Contactless electromagnetic active attack on ring oscillator based true random number generator
True random number generators (TRNGs) are ubiquitous in data security as one of basic
cryptographic primitives. They are primarily used as generators of confidential keys, to …
cryptographic primitives. They are primarily used as generators of confidential keys, to …
A unified PUF and TRNG design based on 40-nm RRAM with high entropy and robustness for IoT security
Physically unclonable function (PUF) and true random number generator (TRNG) are the
indispensable primitives for the Internet-of-Things (IoT) security. In this article, a highly …
indispensable primitives for the Internet-of-Things (IoT) security. In this article, a highly …
New high entropy element for FPGA based true random number generators
M Varchola, M Drutarovsky - … and Embedded Systems, CHES 2010: 12th …, 2010 - Springer
We demonstrate a new high-entropy digital element suitable for True Random Number
Generators (TRNGs) embedded in Field Programmable Gate Arrays (FPGAs). The original …
Generators (TRNGs) embedded in Field Programmable Gate Arrays (FPGAs). The original …
Chip and Skim: cloning EMV cards with the pre-play attack
M Bond, O Choudary, SJ Murdoch… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
EMV, also known as" Chip and PIN", is the leading system for card payments worldwide. It is
used throughout Europe and much of Asia, and is starting to be introduced in North America …
used throughout Europe and much of Asia, and is starting to be introduced in North America …
High-throughput FPGA-compatible TRNG architecture exploiting multistimuli metastable cells
This paper presents a True Random Number Generator (TRNG) exploiting latched-XOR
(LX) gates and its implementation on a **linx Spartan 6 FPGA device. The proposed LX …
(LX) gates and its implementation on a **linx Spartan 6 FPGA device. The proposed LX …