A survey on physical unclonable function (PUF)-based security solutions for Internet of Things
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …
and so on represent a thriving surface for several security attacks with economic …
Physical unclonable functions (PUF) for IoT devices
Physical Unclonable Function (PUF) has recently attracted interest from both industry and
academia as a potential alternative approach to secure Internet of Things (IoT) devices from …
academia as a potential alternative approach to secure Internet of Things (IoT) devices from …
Harnessing disorder for photonic device applications
For photonic devices, structural disorder and light scattering have long been considered
annoying and detrimental features that were best avoided or minimized. This review shows …
annoying and detrimental features that were best avoided or minimized. This review shows …
All-optical multilevel physical unclonable functions
Disordered photonic structures are promising for the realization of physical unclonable
functions—physical objects that can overcome the limitations of conventional digital security …
functions—physical objects that can overcome the limitations of conventional digital security …
Echo state networks-based reservoir computing for mnist handwritten digits recognition
Reservoir Computing is an attractive paradigm of recurrent neural network architecture, due
to the ease of training and existing neuromorphic implementations. Successively applied on …
to the ease of training and existing neuromorphic implementations. Successively applied on …
PUF modeling attacks: An introduction and overview
Machine learning (ML) based modeling attacks are the currently most relevant and effective
attack form for so-called Strong Physical Unclonable Functions (Strong PUFs). We provide …
attack form for so-called Strong Physical Unclonable Functions (Strong PUFs). We provide …
Silicon photonic physical unclonable function
Physical unclonable functions (PUFs) serve as a hardware source of private information that
cannot be duplicated and have applications in hardware integrity and information security …
cannot be duplicated and have applications in hardware integrity and information security …
Recent advances in photonic physical unclonable functions
This special session paper discusses recent advances on photonic physical unclonable
functions (PUFs), providing a broader overview of and motivation for photonic PUFs. We …
functions (PUFs), providing a broader overview of and motivation for photonic PUFs. We …
Secret-free security: A survey and tutorial
U Rührmair - Journal of Cryptographic Engineering, 2022 - Springer
Abstract “Classical keys,” ie, secret keys stored permanently in digital form in nonvolatile
memory, appear indispensable in modern computer security—but also constitute an obvious …
memory, appear indispensable in modern computer security—but also constitute an obvious …
Perfect secrecy cryptography via mixing of chaotic waves in irreversible time-varying silicon chips
Protecting confidential data is a major worldwide challenge. Classical cryptography is fast
and scalable, but is broken by quantum algorithms. Quantum cryptography is unclonable …
and scalable, but is broken by quantum algorithms. Quantum cryptography is unclonable …