FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures

NN Anandakumar, MS Hashmi, M Tehranipoor - Integration, 2021 - Elsevier
Abstract Physically Unclonable Functions (PUFs) are a promising technology and have
been proposed as central building blocks in many cryptographic protocols and security …

AI makes crypto evolve

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
The recent literature reveals a dichotomy formed by a coevolution between cryptography
and Artificial Intelligence (AI). This dichotomy consists of two sides, namely Crypto …

Design and analysis of FPGA-based PUFs with enhanced performance for hardware-oriented security

NN Anandakumar, MS Hashmi… - ACM Journal on Emerging …, 2022 - dl.acm.org
This article presents a thorough analysis of two distinct Physically Unclonable Functions
(PUF), namely RO-PUF (Ring oscillator-based PUF) and RS-LPUF (RS Latch-based PUF) …

Physical unclonable function (PUF)-based e-cash transaction protocol (PUF-Cash)

J Calhoun, C Minwalla, C Helmich, F Saqib, W Che… - Cryptography, 2019 - mdpi.com
Electronic money (e-money or e-Cash) is the digital representation of physical banknotes
augmented by added use cases of online and remote payments. This paper presents a …

Analysis of IoT authentication over LoRa

D Heeger, J Plusquellic - 2020 16th International Conference …, 2020 - ieeexplore.ieee.org
Implementing a full set of security features within IoT devices is challenging because of
constraints on the available resources and power consumption. Nevertheless, such devices …

An evaluation method of the anti-modeling-attack capability of PUFs

Y Chen, X Cui, Y Liu, X Cui - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
The physical unclonable function (PUF) is regarded as the root of trust of hardware systems.
However, it suffers from the modeling attacks based on machine learning (ML) algorithms …

Enhancing privacy in PUF-cash through multiple trusted third parties and reinforcement learning

G Fragkos, C Minwalla, EE Tsiropoulou… - ACM Journal on …, 2021 - dl.acm.org
Electronic cash (e-Cash) is a digital alternative to physical currency such as coins and bank
notes. Suitably constructed, e-Cash has the ability to offer an anonymous offline experience …

A delay-based machine learning model for DMA attack mitigation

Y Gui, C Bhure, M Hughes, F Saqib - Cryptography, 2021 - mdpi.com
Direct Memory Access (DMA) is a state-of-the-art technique to optimize the speed of memory
access and to efficiently use processing power during data transfers between the main …

Adversarial security attacks and perturbations on machine learning and deep learning methods

A Siddiqi - arxiv preprint arxiv:1907.07291, 2019 - arxiv.org
The ever-growing big data and emerging artificial intelligence (AI) demand the use of
machine learning (ML) and deep learning (DL) methods. Cybersecurity also benefits from …

[LIVRE][B] Crypto and AI: From Coevolution to Quantum Revolution

B Zolfaghari, HR Nemati, N Yanai, K Bibak - 2023 - Springer
This book studies the intersection between cryptography and AI, highlighting the significant
cross-impact and potential between the two technologies. The authors first study the …