Physical unclonable functions in the internet of things: State of the art and open challenges
Attacks on Internet of Things (IoT) devices are on the rise. Physical Unclonable Functions
(PUFs) are proposed as a robust and lightweight solution to secure IoT devices. The main …
(PUFs) are proposed as a robust and lightweight solution to secure IoT devices. The main …
A survey on lightweight entity authentication with strong PUFs
Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of
an Integrated Circuit (IC). Their input-output behavior serves as a unique IC “fingerprint.” …
an Integrated Circuit (IC). Their input-output behavior serves as a unique IC “fingerprint.” …
PUF based authentication protocol for IoT
A Braeken - Symmetry, 2018 - mdpi.com
Key agreement between two constrained Internet of Things (IoT) devices that have not met
each other is an essential feature to provide in order to establish trust among its users …
each other is an essential feature to provide in order to establish trust among its users …
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
S Katzenbeisser, Ü Kocabaş, V Rožić… - … and Embedded Systems …, 2012 - Springer
Abstract Physically Unclonable Functions (PUFs) are an emerging technology and have
been proposed as central building blocks in a variety of cryptographic protocols and security …
been proposed as central building blocks in a variety of cryptographic protocols and security …
Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs
RFID-based tokens are increasingly used in electronic payment and ticketing systems for
mutual authentication of tickets and terminals. These systems typically use cost-effective …
mutual authentication of tickets and terminals. These systems typically use cost-effective …
End-to-end design of a PUF-based privacy preserving authentication protocol
A Aysu, E Gulcan, D Moriyama, P Schaumont… - … and Embedded Systems …, 2015 - Springer
We demonstrate a prototype implementation of a provably secure protocol that supports
privacy-preserving mutual authentication between a server and a constrained device. Our …
privacy-preserving mutual authentication between a server and a constrained device. Our …
Physical characterization of arbiter PUFs
S Tajik, E Dietz, S Frohmann, JP Seifert… - … and Embedded Systems …, 2014 - Springer
As intended by its name, Physically Unclonable Functions (PUFs) are considered as an
ultimate solution to deal with insecure storage, hardware counterfeiting, and many other …
ultimate solution to deal with insecure storage, hardware counterfeiting, and many other …
Physically uncloneable functions in the universal composition framework
C Brzuska, M Fischlin, H Schröder… - Advances in Cryptology …, 2011 - Springer
Recently, there have been numerous works about hardwareassisted cryptographic
protocols, either improving previous constructions in terms of efficiency, or in terms of …
protocols, either improving previous constructions in terms of efficiency, or in terms of …
PUF-based authentication
In the context of hardware systems, authentication refers to the process of confirming the
identity and authenticity of chip, board and system components such as RFID tags, smart …
identity and authenticity of chip, board and system components such as RFID tags, smart …
Photonic side-channel analysis of arbiter PUFs
S Tajik, E Dietz, S Frohmann, H Dittrich… - Journal of …, 2017 - Springer
As intended by its name, physically unclonable functions (PUFs) are considered as an
ultimate solution to deal with insecure storage, hardware counterfeiting, and many other …
ultimate solution to deal with insecure storage, hardware counterfeiting, and many other …