Puf enrollment and life cycle management: Solutions and perspectives for the test community
Physically Unclonable Functions (PUFs) allow to extract unique fingerprints from silicon
chips. The applications are numerous: chip identification, chip master key extraction …
chips. The applications are numerous: chip identification, chip master key extraction …
A survey on silicon PUFs
Abstract Integrated Circuits (ICs) and electronic devices have become an integral part of
daily human life (mobile, home, car, etc.). However, specific security measures should be …
daily human life (mobile, home, car, etc.). However, specific security measures should be …
Multiclass classification-based side-channel hybrid attacks on strong PUFs
W Liu, R Wang, X Qi, L Jiang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) are promising solutions for low-cost device
authentication; hence, ignoring the security of PUFs is becoming increasingly difficult …
authentication; hence, ignoring the security of PUFs is becoming increasingly difficult …
Secure puf-based authentication and key exchange protocol using machine learning
Error Correction Codes and Fuzzy Extractors (FE) using publicly available helper data are
used to increase the reliability of the secret value generated from noisy sources such as …
used to increase the reliability of the secret value generated from noisy sources such as …
Strong puf enrollment with machine learning: A methodical approach
Physically Unclonable Functions (PUFs) have become ubiquitous as part of the emerging
cryptographic algorithms. Strong PUFs are also predominantly addressed as the suitable …
cryptographic algorithms. Strong PUFs are also predominantly addressed as the suitable …
Security Evaluation of Feed-Forward Interpose PUF Against Modelling Attacks
W Xu, L Pang, Y Tang, M Chen - 2024 IEEE 4th International …, 2024 - ieeexplore.ieee.org
Physical unclonable function (PUF) is a lightweight hardware-safe circuit structure for
Internet of Things (IoT). The susceptibility to neural network modeling attacks stands out as a …
Internet of Things (IoT). The susceptibility to neural network modeling attacks stands out as a …
An efficient approach to model strong puf with multi-layer perceptron using transfer learning
The study to increase the capability to model strong Physically Unclonable Functions (PUFs)
has been a trend recently in the field of Cryptography and Hardware Security. The race …
has been a trend recently in the field of Cryptography and Hardware Security. The race …
Elaborating on sub-space modeling as an enrollment solution for strong puf
In this work we present sub-space modeling of strong PUF as a cost efficient solution for
PUF enrollment for the designers' community. Our goal is to demonstrate a method which …
PUF enrollment for the designers' community. Our goal is to demonstrate a method which …
PUF based Secure Computing for Constraint Cyber Physical Object
A Alipour - 2022 - theses.hal.science
The research work practiced in this PhD program is dedicated to investigating the use of
machine learning in creating novel security solutions based on Physically Unclonable …
machine learning in creating novel security solutions based on Physically Unclonable …
[BUCH][B] Compact Field Programmable Gate Array Based Physical Unclonable Functions Circuits
Y Hu - 2022 - search.proquest.com
Abstract The Physical Unclonable Functions (PUFs) is a candidate to provide a secure solid
root source for identification and authentication applications. It is precious for FPGA-based …
root source for identification and authentication applications. It is precious for FPGA-based …