We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 97 results
  1. Aging Resilient and Energy Efficient Ring Oscillator for PUF Design

    Hardware-based security primitives play an important role in protecting and securing a system in Internet of Things (loT) applications. The most...
    Anmol Verma, Shubhang Srivastava, Ambika Prasad Shah in VLSI Design and Test
    Conference paper 2022
  2. Pass Transistor XOR Gate Based Radiation Hardened RO-PUF

    Hardware security is important and need of the hour particularly for low cost electronic devices. Hardware-based encryption designs such as...
    Syed Farah Naz, Sajid Khan, Ambika Prasad Shah in VLSI Design and Test
    Conference paper 2022
  3. Simple electromagnetic analysis attack based on geometric leak on ASIC implementation of ring-oscillator PUF

    Physically unclonable functions (PUFs) are assumed to provide high tamper resistance against counterfeiting and hardware attacks since PUFs extract...

    Mitsuru Shiozaki, Takeshi Fu**o in Journal of Cryptographic Engineering
    Article 03 September 2020
  4. A Physically Unclonable Function for Biomedical Devices Authentication

    Security and authentication of low-power embedded systems for the internet of things (IoT) is a research topic that is growing due to the extensive...
    João Cabacinho, João Casaleiro, Luís B. Oliveira in Technological Innovation for Human-Centric Systems
    Conference paper 2024
  5. A Design of CMOS PUF Based on Ring Oscillator and Time-to-Digital Converter

    Physical unclonable functions (PUF) is a promising technique in the field of hardware security with the main principle based on the random variations...
    Van-Phuc Hoang, Quang Phuong Nguyen, ... Xuan Nam Tran in Industrial Networks and Intelligent Systems
    Conference paper 2021
  6. A New Efficient PUF-Based Mutual Authentication Scheme for Drones

    This paper proposes a new lightweight mutual authentication scheme for drones that is based on a Physical Unclonable Function (PUF) which uses...
    Edoukou Berenger Ayebie, Karam Bou-chaaya, Helmi Rais in Risks and Security of Internet and Systems
    Conference paper 2024
  7. Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF

    In the last years, Physical Unclonable Functions (PUFs) became a popular security primitive, which is nowadays also used in several products. As a...
    Conference paper 2024
  8. Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs

    Physically unclonable functions (PUFs) can be seen as hardware circuits whose output does not only depend upon the inputs fed to it, but also on the...
    Manthan Kojage, Neelofar Hassan, Urbi Chatterjee in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2022
  9. Self-secured PUF: Protecting the Loop PUF by Masking

    Physical Unclonable Functions (PUFs) provide means to generate chip individual keys, especially for low-cost applications such as the Internet of...
    Lars Tebelmann, Jean-Luc Danger, Michael Pehl in Constructive Side-Channel Analysis and Secure Design
    Conference paper 2021
  10. A new read–write collision-based SRAM PUF implemented on **linx FPGAs

    Physically unclonable functions (PUFs) are device-specific digital fingerprints derived from physical properties. They are used in critical...

    Ihsan Cicek, Ahmad Al Khas in Journal of Cryptographic Engineering
    Article 29 January 2022
  11. A large-scale comprehensive evaluation of single-slice ring oscillator and PicoPUF bit cells on 28-nm **linx FPGAs

    Lightweight implementation of security primitives, e.g., physical unclonable functions (PUFs) and true random number generator, in field programmable...

    Chongyan Gu, Chip-Hong Chang, ... Máire O’Neill in Journal of Cryptographic Engineering
    Article Open access 24 December 2020
  12. PUF: a new era in IoT security

    Physically unclonable function (PUF) is one of the most advocated security primitives which extracts the uncontrollable intrinsic physical property...

    Bibhash Sen in CSI Transactions on ICT
    Article 17 June 2020
  13. ReOPUF: Relaxation Oscillator Physical Unclonable Function for Reliable Key Generation in IoT Security

    Physical Unclonable Function (PUF) has emerged as a hardware security block designed with low-cost and key generation for IC identification and...
    Raveendra Podeti, Srihari Rao Patri, ... Muralidhar Pullakandam in Internet of Things. Technology and Applications
    Conference paper 2022
  14. PUF-Based Intellectual Property Protection for CNN Model

    It usually takes a lot of time and resources to train a high-accurate Machine Learning model, so it is believed that the trainer owns the...
    Dawei Li, Yangkun Ren, ... Jianwei Liu in Knowledge Science, Engineering and Management
    Conference paper 2022
  15. Sensor-Based PUF: A Lightweight Random Number Generator for Resource Constrained IoT Devices

    Internet of Things (IoT) prevalence is surging swiftly over the past years, and by 2050, the number of IoT devices are expected to exceed 50 billion....
    Maaike Hillerström, Ikram Ullah, Paul J. M. Havinga in Internet of Things. IoT through a Multi-disciplinary Perspective
    Conference paper 2022
  16. A strong physical unclonable function with machine learning immunity for Internet of Things application

    The physical unclonable functions (PUFs) are novel cryptographic primitives in modern hardware security systems. Compared with traditional...

    Pengpeng Ren, Yongkang Xue, ... Zhigang Ji in Science China Information Sciences
    Article 18 December 2023
  17. A Survey of Security Attacks on Silicon Based Weak PUF Architectures

    Physically Unclonable Functions (PUFs) are popular hardware-based security primitives that can derive chip signatures from the inherent...
    Chintala Yehoshuva, R. Raja Adhithan, N. Nalla Anandakumar in Security in Computing and Communications
    Conference paper 2021
  18. A Low-Cost Authentication Protocol Using Arbiter-PUF

    Integrated Circuits (ICs) and electronic devices become part of human daily life (mobile, home, car, etc.) and for the safety of the information...
    Fahem Zerrouki, Samir Ouchani, Hafida Bouarfa in Model and Data Engineering
    Conference paper 2021
  19. Attack Is the Best Defense: A Multi-Mode Poisoning PUF Against Machine Learning Attacks

    Resistance to modeling attacks is an important issue for Physical Unclonable Functions (PUFs). Deep learning, the state-of-the-art modeling attack,...
    Chia-Chih Lin, Ming-Syan Chen in Advances in Knowledge Discovery and Data Mining
    Conference paper 2021
  20. A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model

    Analysis of advanced physical unclonable function (PUF) applications and protocols relies on assuming that a PUF behaves like a random oracle; that...

    Marten van Dijk, Chenglu ** in Journal of Cryptology
    Article Open access 03 August 2023
Did you find what you were looking for? Share feedback.