Making use of manufacturing process variations: A do**less transistor based-PUF for hardware-assisted security
VP Yanambaka, SP Mohanty… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Time to market is a vital aspect of electronic product development. When it comes to device
technology, the time needed for the device fabrication processes to stabilize is relatively …
technology, the time needed for the device fabrication processes to stabilize is relatively …
Modelling attack analysis of configurable ring oscillator (CRO) PUF designs
Physical Unclonable Functions (PUFs) have emerged as a lightweight security primitive for
resource constrained devices. However, conventional delay-based Physical Unclonable …
resource constrained devices. However, conventional delay-based Physical Unclonable …
Making use of semiconductor manufacturing process variations: FinFET-based physical unclonable functions for efficient security integration in the IoT
In a typical design environment, semiconductor manufacturing variations are considered as
challenges for nanoelectronic circuit design engineers. This has led to multi-front research …
challenges for nanoelectronic circuit design engineers. This has led to multi-front research …
Novel randomized placement for FPGA based robust ROPUF with improved uniqueness
AS Chauhan, V Sahula, AS Mandal - Journal of Electronic Testing, 2019 - Springer
The physical unclonable functions (PUFs) are used to provide software as well as hardware
security for the cyber-physical systems. They have been used for performing significant …
security for the cyber-physical systems. They have been used for performing significant …
Secure split test techniques to prevent IC piracy for IoT devices
Globalization of semiconductor manufacturing and related activities has led to several
security issues like counterfeiting, IP infringement and cloning etc. Counterfeiting not only …
security issues like counterfeiting, IP infringement and cloning etc. Counterfeiting not only …
A dependable and resource-frugal ring oscillator physically unclonable function
FS Hossain, N Hossain, S Tabassum… - … Journal of Electronics, 2025 - Taylor & Francis
ABSTRACT Silicon Physical Unclonable Function (PUF) is a crucial component for
hardware security, providing unique device identification in networks. PUF provides robust …
hardware security, providing unique device identification in networks. PUF provides robust …
Novel randomized & biased placement for FPGA based robust random number generator with enhanced uniqueness
AS Chauhan, V Sahula… - 2019 32nd International …, 2019 - ieeexplore.ieee.org
The physical unclonable functions (PUF) have widely been used to provide software as well
as hardware security for the cyber-physical systems. They are used for performing significant …
as hardware security for the cyber-physical systems. They are used for performing significant …
[КНИГА][B] IP Core Protection and Hardware-Assisted Security for Consumer Electronics
A Sengupta, SP Mohanty - 2019 - smohanty.org
Untitled Page 1 Page 2 1 IP Core Protection and Hardware-Assisted Security for Consumer
Electronics Authors: Anirban Sengupta and Saraju P. Mohanty Table of Contents …
Electronics Authors: Anirban Sengupta and Saraju P. Mohanty Table of Contents …
Reconfigurable robust hybrid oscillator arbiter PUF for IoT security based on DL-FET
VP Yanambaka, SP Mohanty… - 2017 IEEE Computer …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) is currently a main focus of research across disciplines. In a
household IoT environment, almost all devices are connected to the Internet. In the case of a …
household IoT environment, almost all devices are connected to the Internet. In the case of a …
Novel placement bias for realizing highly reliable physical unclonable functions on FPGA
AS Chauhan, V Sahula… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
The Physical Unclonable Functions have been widely used to provide software as well as
hardware security for the cyber-physical systems. They are used for performing significant …
hardware security for the cyber-physical systems. They are used for performing significant …