FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures
Abstract Physically Unclonable Functions (PUFs) are a promising technology and have
been proposed as central building blocks in many cryptographic protocols and security …
been proposed as central building blocks in many cryptographic protocols and security …
AI makes crypto evolve
The recent literature reveals a dichotomy formed by a coevolution between cryptography
and Artificial Intelligence (AI). This dichotomy consists of two sides, namely Crypto …
and Artificial Intelligence (AI). This dichotomy consists of two sides, namely Crypto …
Design and analysis of FPGA-based PUFs with enhanced performance for hardware-oriented security
This article presents a thorough analysis of two distinct Physically Unclonable Functions
(PUF), namely RO-PUF (Ring oscillator-based PUF) and RS-LPUF (RS Latch-based PUF) …
(PUF), namely RO-PUF (Ring oscillator-based PUF) and RS-LPUF (RS Latch-based PUF) …
Physical unclonable function (PUF)-based e-cash transaction protocol (PUF-Cash)
Electronic money (e-money or e-Cash) is the digital representation of physical banknotes
augmented by added use cases of online and remote payments. This paper presents a …
augmented by added use cases of online and remote payments. This paper presents a …
Analysis of IoT authentication over LoRa
D Heeger, J Plusquellic - 2020 16th International Conference …, 2020 - ieeexplore.ieee.org
Implementing a full set of security features within IoT devices is challenging because of
constraints on the available resources and power consumption. Nevertheless, such devices …
constraints on the available resources and power consumption. Nevertheless, such devices …
An evaluation method of the anti-modeling-attack capability of PUFs
Y Chen, X Cui, Y Liu, X Cui - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
The physical unclonable function (PUF) is regarded as the root of trust of hardware systems.
However, it suffers from the modeling attacks based on machine learning (ML) algorithms …
However, it suffers from the modeling attacks based on machine learning (ML) algorithms …
Enhancing privacy in PUF-cash through multiple trusted third parties and reinforcement learning
Electronic cash (e-Cash) is a digital alternative to physical currency such as coins and bank
notes. Suitably constructed, e-Cash has the ability to offer an anonymous offline experience …
notes. Suitably constructed, e-Cash has the ability to offer an anonymous offline experience …
A delay-based machine learning model for DMA attack mitigation
Direct Memory Access (DMA) is a state-of-the-art technique to optimize the speed of memory
access and to efficiently use processing power during data transfers between the main …
access and to efficiently use processing power during data transfers between the main …
Adversarial security attacks and perturbations on machine learning and deep learning methods
A Siddiqi - arxiv preprint arxiv:1907.07291, 2019 - arxiv.org
The ever-growing big data and emerging artificial intelligence (AI) demand the use of
machine learning (ML) and deep learning (DL) methods. Cybersecurity also benefits from …
machine learning (ML) and deep learning (DL) methods. Cybersecurity also benefits from …
[LIVRE][B] Crypto and AI: From Coevolution to Quantum Revolution
This book studies the intersection between cryptography and AI, highlighting the significant
cross-impact and potential between the two technologies. The authors first study the …
cross-impact and potential between the two technologies. The authors first study the …