-
301
Design of high recognition PUF circuit based on monostable timing deviation(基于单稳态定时偏差的高识别性PUF电路设计)
Published 2017-01-01“…通过对单稳态电路定时偏差和物理不可克隆函数(physical unclonable functions,PUF)电路的研究,提出了一种基于单稳态定时偏差的高识别性PUF电路设计方案.首先,分析单稳态定时电路的自我标识物理特性,提出长定时单稳态电路设计方法;然后,利用该单稳态电路产生的定时偏差信号以及激励信号控制数据选择器选择2个定时偏差信号,结合仲裁器判决唯一的、不可克隆的输出响应.采用TSMC 65nm CMOS工艺,在不同环境下对设计的PUF电路进行Monte Carlo仿真,分析其识别性、可靠性等特性.实验结果显示,所设计的PUF电路识别性可达99.82%,且误码率为2.7%.…”
Get full text
Article -
302
PUFGuard: Vehicle-to-Everything Authentication Protocol for Secure Multihop Mobile Communication
Published 2023-11-01“…The main focus of this paper is the introduction and application of physically unclonable functions (PUFs) as a pivotal element in secure key generation, authentication processes, and trust metric definition for neighboring vehicles. …”
Get full text
Article -
303
SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs
Published 2021-05-01“…This generator, which was designed using chaotic systems, physical unclonable functions, and optimization algorithms, stands out as the innovative aspect of the study. …”
Get full text
Article -
304
Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm
Published 2022-11-01“…To protect the security of smart devices, we embed physical unclonable functions (PUF) into each smart device. Real-or-random model, informal security analysis, and ProVerif are adopted to verify the security of our protocol. …”
Get full text
Article -
305
Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT
Published 2020-03-01“…In this article we combine Physically Unclonable Function (PUF) hardware (using Field Programmable Gate Arrays—FPGAs), together with a multi-layer approach to cloud computing from the National Institute of Standards and Technology (NIST). …”
Get full text
Article -
306
Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks
Published 2021-03-01“…Traditional authentication techniques, such as cryptographic solutions, are vulnerable to various attacks occurring on session keys and data. Physical unclonable functions (PUFs) such as dynamic random access memory (DRAM)-based PUFs are introduced as promising security blocks to enable cryptography and authentication services. …”
Get full text
Article -
307
Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT
Published 2022-12-01“…A unique blockchain-based authentication approach is designed to secure communication among mobile IoT devices using multiple stages of security implementation with Smart Agreement and physically unclonable functions. Analytical modeling with lightweight finite field encryption is used to create this framework in Python. …”
Get full text
Article -
308
Key Recovery for Content Protection Using Ternary PUFs Designed with Pre-Formed ReRAM
Published 2022-02-01“…Physical unclonable functions, embedded in terminal devices, can be used as part of the recovery process of session keys that protect digital files. …”
Get full text
Article -
309
A Spin‐Orbit Torque Switch at Ferromagnet/Antiferromagnet Interface Toward Stochastic or Memristive Applications via Tailoring Antiferromagnetic Ordering
Published 2023-12-01“…On the contrary, the weak AFM ordering via reducing IrMn thickness will lead to significant stochasticity for the physically unclonable functionality. This work demonstrates an intrinsic tuning over the AFM ordering will serve as a switch to turn the SOT device into a stochastic/memristive cell to bridge probabilistic and neuromorphic computing.…”
Get full text
Article -
310
A Physical Layer, Zero-Round-Trip-Time, Multifactor Authentication Protocol
Published 2022-01-01“…Lightweight physical layer security schemes that have recently attracted a lot of attention include physical unclonable functions (PUFs), RF fingerprinting / proximity based authentication and secret key generation (SKG) from wireless fading coefficients. …”
Get full text
Article -
311
A noise bifurcation architecture for linear additive physical functions
Published 2015“…Physical Unclonable Functions (PUFs) allow a silicon device to be authenticated based on its manufacturing variations using challenge/response evaluations. …”
Get full text
Get full text
Article -
312
Anti-counterfeiting technology through artificial intelligence and challenge-response pairs
Published 2022“…To overcome the weakness, optical physical unclonable functions (PUF) has been spotlighted as a promising tool in authentication and identification for its simple detection and rich optical features. …”
Get full text
Thesis-Master by Coursework -
313
Design of security primitives for trustworthy integrated circuits
Published 2015“…In the dissertation, two embedded hardware security primitives, namely active current sensors and Physical Unclonable Functions (PUFs) are investigated for hardware Trojan (HT) detection, device identification and authentication. …”
Get full text
Thesis -
314
Quantum Lock: A Provable Quantum Communication Advantage
Published 2023-05-01“…Physical unclonable functions(PUFs) provide a unique fingerprint to a physical entity by exploiting the inherent physical randomness. …”
Get full text
Article -
315
Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning
Published 2022-02-01“…State-of-the-art schemes for trusted devices with physical unclonable functions (PUF) have complex enrollment processes. …”
Get full text
Article -
316
Design of Secure and Efficient Authentication Protocol for Edge Computing-Based Augmented Reality Environments
Published 2024-01-01“…We also employ extended Chebyshev chaotic maps and physical unclonable functions to ensure security and efficiency during the authentication process. …”
Get full text
Article -
317
-
318
Leveraging Ferroelectric Stochasticity and In-Memory Computing for DNN IP Obfuscation
Published 2022-01-01“…In this work, we propose an energy-efficient defense technique that combines a ferroelectric field effect transistor (FeFET)-based reconfigurable physically unclonable function (PUF) with an in-memory FeFET XNOR to thwart model stealing attacks. …”
Get full text
Article -
319
Correlation-Based Robust Authentication (Cobra) Using Helper Data Only
Published 2018-08-01“…Physical unclonable function (PUF)-based authentication protocols have been proposed as a strong challenge-response form of authentication for internet of things (IoT) and embedded applications. …”
Get full text
Article -
320
Designing secure PUF-based authentication protocols for constrained environments
Published 2023-12-01“…Abstract Physical Unclonable Functions (PUFs) are widely used in cryptographic authentication and key-agreement protocols due to their unique physical properties. …”
Get full text
Article