Smart distributed ledger technologies in Industry 4.0: Challenges and opportunities in supply chain management
The rise of new digital economies and data-driven supply-chains seeks to revolutionalise
the ways information is transferred, processed and analysed across different industry …
the ways information is transferred, processed and analysed across different industry …
**linx FPGA-based ring oscillator PUFs: design challenges and solutions
The configurability and programmability features of the FPGA boards make it a preferred
platform to implement vast IoT and embedded systems applications. However, FPGAs are …
platform to implement vast IoT and embedded systems applications. However, FPGAs are …
Novel technique to improve strength of weak arbiter PUF
In this paper, we aim at increasing the strength of weak arbiter physical unclonable function
(APUF) which are vulnerable to modeling attacks because of low uniqueness and …
(APUF) which are vulnerable to modeling attacks because of low uniqueness and …
CycPUF: Cyclic Physical Unclonable Function
Physical Unclonable Functions (PUFs) leverage manufacturing process imperfections that
cause propagation delay discrepancies for the signals traveling along these paths. While …
cause propagation delay discrepancies for the signals traveling along these paths. While …
METAPUF: A challenge response pair generator
Physically unclonable function (PUF) is a hardware security module preferred for hardware
feature based random number and secret key generation. Security of a cryptographic system …
feature based random number and secret key generation. Security of a cryptographic system …
Extending FPGA Information Leaks with Trojan Phantom Circuits
Field-Programmable Gate Arrays (FPGAs) are increasingly used in data centers and in
cloud computing for acceleration of various applications. However, cloud-based FPGAs …
cloud computing for acceleration of various applications. However, cloud-based FPGAs …
Design of a Hardware Security PUF Immune to Machine Learning Attacks
NK Pundir - 2017 - rave.ohiolink.edu
The technology and cyberspace sector is losing billions each year to hardware security
threats. The incidents of usage of counterfeiting chips are doubling each year. The …
threats. The incidents of usage of counterfeiting chips are doubling each year. The …