Smart distributed ledger technologies in Industry 4.0: Challenges and opportunities in supply chain management

G Epiphaniou, M Bottarelli, H Al-Khateeb… - … Defence in the Age of AI …, 2020 - Springer
The rise of new digital economies and data-driven supply-chains seeks to revolutionalise
the ways information is transferred, processed and analysed across different industry …

**linx FPGA-based ring oscillator PUFs: design challenges and solutions

H Kareem, D Dunaev - 2022 11th Mediterranean Conference …, 2022 - ieeexplore.ieee.org
The configurability and programmability features of the FPGA boards make it a preferred
platform to implement vast IoT and embedded systems applications. However, FPGAs are …

Novel technique to improve strength of weak arbiter PUF

N Pundir, F Amsaad, M Choudhury… - 2017 IEEE 60th …, 2017 - ieeexplore.ieee.org
In this paper, we aim at increasing the strength of weak arbiter physical unclonable function
(APUF) which are vulnerable to modeling attacks because of low uniqueness and …

CycPUF: Cyclic Physical Unclonable Function

M Dominguez, A Rezaei - 2024 Design, Automation & Test in …, 2024 - ieeexplore.ieee.org
Physical Unclonable Functions (PUFs) leverage manufacturing process imperfections that
cause propagation delay discrepancies for the signals traveling along these paths. While …

METAPUF: A challenge response pair generator

A Kumar, SL Tripathi, RS Mishra - Periodicals of Engineering and …, 2018 - pen.ius.edu.ba
Physically unclonable function (PUF) is a hardware security module preferred for hardware
feature based random number and secret key generation. Security of a cryptographic system …

Extending FPGA Information Leaks with Trojan Phantom Circuits

A Etim, S Tian, J Szefer - 2024 International Symposium on …, 2024 - ieeexplore.ieee.org
Field-Programmable Gate Arrays (FPGAs) are increasingly used in data centers and in
cloud computing for acceleration of various applications. However, cloud-based FPGAs …

Design of a Hardware Security PUF Immune to Machine Learning Attacks

NK Pundir - 2017 - rave.ohiolink.edu
The technology and cyberspace sector is losing billions each year to hardware security
threats. The incidents of usage of counterfeiting chips are doubling each year. The …