Showing 301 - 320 results of 336 for search '"Physical Unclonable Function"', query time: 0.11s Refine Results
  1. 301

    Design of high recognition PUF circuit based on monostable timing deviation(基于单稳态定时偏差的高识别性PUF电路设计) by QIANHaoyu(钱浩宇), WANGPengjun(汪鹏君), ZHANGYuejun(张跃军), LIGang(李刚)

    Published 2017-01-01
    “…通过对单稳态电路定时偏差和物理不可克隆函数(physical unclonable functions,PUF)电路的研究,提出了一种基于单稳态定时偏差的高识别性PUF电路设计方案.首先,分析单稳态定时电路的自我标识物理特性,提出长定时单稳态电路设计方法;然后,利用该单稳态电路产生的定时偏差信号以及激励信号控制数据选择器选择2个定时偏差信号,结合仲裁器判决唯一的、不可克隆的输出响应.采用TSMC 65nm CMOS工艺,在不同环境下对设计的PUF电路进行Monte Carlo仿真,分析其识别性、可靠性等特性.实验结果显示,所设计的PUF电路识别性可达99.82%,且误码率为2.7%.…”
    Get full text
    Article
  2. 302

    PUFGuard: Vehicle-to-Everything Authentication Protocol for Secure Multihop Mobile Communication by Fayez Gebali, Mohamed K. Elhadad

    Published 2023-11-01
    “…The main focus of this paper is the introduction and application of physically unclonable functions (PUFs) as a pivotal element in secure key generation, authentication processes, and trust metric definition for neighboring vehicles. …”
    Get full text
    Article
  3. 303

    SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs by Aina’u Shehu Muhammad, Fatih Özkaynak

    Published 2021-05-01
    “…This generator, which was designed using chaotic systems, physical unclonable functions, and optimization algorithms, stands out as the innovative aspect of the study. …”
    Get full text
    Article
  4. 304

    Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm by Tsu-Yang Wu, Fangfang Kong, Liyang Wang, Yeh-Cheng Chen, Saru Kumari, Jeng-Shyang Pan

    Published 2022-11-01
    “…To protect the security of smart devices, we embed physical unclonable functions (PUF) into each smart device. Real-or-random model, informal security analysis, and ProVerif are adopted to verify the security of our protocol. …”
    Get full text
    Article
  5. 305

    Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT by Hussain Al-Aqrabi, Anju P. Johnson, Richard Hill, Phil Lane, Tariq Alsboui

    Published 2020-03-01
    “…In this article we combine Physically Unclonable Function (PUF) hardware (using Field Programmable Gate Arrays—FPGAs), together with a multi-layer approach to cloud computing from the National Institute of Standards and Technology (NIST). …”
    Get full text
    Article
  6. 306

    Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks by Fatemeh Najafi, Masoud Kaveh, Diego Martín, Mohammad Reza Mosavi

    Published 2021-03-01
    “…Traditional authentication techniques, such as cryptographic solutions, are vulnerable to various attacks occurring on session keys and data. Physical unclonable functions (PUFs) such as dynamic random access memory (DRAM)-based PUFs are introduced as promising security blocks to enable cryptography and authentication services. …”
    Get full text
    Article
  7. 307

    Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT by Rashidah Funke Olanrewaju, Burhan Ul Islam Khan, Miss Laiha Mat Kiah, Nor Aniza Abdullah, Khang Wen Goh

    Published 2022-12-01
    “…A unique blockchain-based authentication approach is designed to secure communication among mobile IoT devices using multiple stages of security implementation with Smart Agreement and physically unclonable functions. Analytical modeling with lightweight finite field encryption is used to create this framework in Python. …”
    Get full text
    Article
  8. 308

    Key Recovery for Content Protection Using Ternary PUFs Designed with Pre-Formed ReRAM by Bertrand Francis Cambou, Saloni Jain

    Published 2022-02-01
    “…Physical unclonable functions, embedded in terminal devices, can be used as part of the recovery process of session keys that protect digital files. …”
    Get full text
    Article
  9. 309

    A Spin‐Orbit Torque Switch at Ferromagnet/Antiferromagnet Interface Toward Stochastic or Memristive Applications via Tailoring Antiferromagnetic Ordering by Ssu‐Yuan Wang, Sheng‐Huai Chen, Hao‐Kai Chang, Yi‐Ting Li, Chih‐Hsiang Tseng, Po‐Chuan Chen, Chao‐Yao Yang, Chih‐Huang Lai

    Published 2023-12-01
    “…On the contrary, the weak AFM ordering via reducing IrMn thickness will lead to significant stochasticity for the physically unclonable functionality. This work demonstrates an intrinsic tuning over the AFM ordering will serve as a switch to turn the SOT device into a stochastic/memristive cell to bridge probabilistic and neuromorphic computing.…”
    Get full text
    Article
  10. 310

    A Physical Layer, Zero-Round-Trip-Time, Multifactor Authentication Protocol by Miroslav Mitev, Mahdi Shakiba-Herfeh, Arsenia Chorti, Martin Reed, Sajjad Baghaee

    Published 2022-01-01
    “…Lightweight physical layer security schemes that have recently attracted a lot of attention include physical unclonable functions (PUFs), RF fingerprinting / proximity based authentication and secret key generation (SKG) from wireless fading coefficients. …”
    Get full text
    Article
  11. 311

    A noise bifurcation architecture for linear additive physical functions by Yu, Meng-Day, M’Raihi, David, Verbauwhede, Ingrid, Devadas, Srinivas

    Published 2015
    “…Physical Unclonable Functions (PUFs) allow a silicon device to be authenticated based on its manufacturing variations using challenge/response evaluations. …”
    Get full text
    Get full text
    Article
  12. 312

    Anti-counterfeiting technology through artificial intelligence and challenge-response pairs by Yan, Zhiyuan

    Published 2022
    “…To overcome the weakness, optical physical unclonable functions (PUF) has been spotlighted as a promising tool in authentication and identification for its simple detection and rich optical features. …”
    Get full text
    Thesis-Master by Coursework
  13. 313

    Design of security primitives for trustworthy integrated circuits by Cao, Yuan

    Published 2015
    “…In the dissertation, two embedded hardware security primitives, namely active current sensors and Physical Unclonable Functions (PUFs) are investigated for hardware Trojan (HT) detection, device identification and authentication. …”
    Get full text
    Thesis
  14. 314

    Quantum Lock: A Provable Quantum Communication Advantage by Kaushik Chakraborty, Mina Doosti, Yao Ma, Chirag Wadhwa, Myrto Arapinis, Elham Kashefi

    Published 2023-05-01
    “…Physical unclonable functions(PUFs) provide a unique fingerprint to a physical entity by exploiting the inherent physical randomness. …”
    Get full text
    Article
  15. 315

    Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning by Victor Takashi Hayashi, Wilson Vicente Ruggiero

    Published 2022-02-01
    “…State-of-the-art schemes for trusted devices with physical unclonable functions (PUF) have complex enrollment processes. …”
    Get full text
    Article
  16. 316

    Design of Secure and Efficient Authentication Protocol for Edge Computing-Based Augmented Reality Environments by DeokKyu Kwon, Youngho Park

    Published 2024-01-01
    “…We also employ extended Chebyshev chaotic maps and physical unclonable functions to ensure security and efficiency during the authentication process. …”
    Get full text
    Article
  17. 317
  18. 318

    Leveraging Ferroelectric Stochasticity and In-Memory Computing for DNN IP Obfuscation by Likhitha Mankali, Nikhil Rangarajan, Swetaki Chatterjee, Shubham Kumar, Yogesh Singh Chauhan, Ozgur Sinanoglu, Hussam Amrouch

    Published 2022-01-01
    “…In this work, we propose an energy-efficient defense technique that combines a ferroelectric field effect transistor (FeFET)-based reconfigurable physically unclonable function (PUF) with an in-memory FeFET XNOR to thwart model stealing attacks. …”
    Get full text
    Article
  19. 319

    Correlation-Based Robust Authentication (Cobra) Using Helper Data Only by Jim Plusquellic, Matt Areno

    Published 2018-08-01
    “…Physical unclonable function (PUF)-based authentication protocols have been proposed as a strong challenge-response form of authentication for internet of things (IoT) and embedded applications. …”
    Get full text
    Article
  20. 320

    Designing secure PUF-based authentication protocols for constrained environments by Sang-Woong Lee, Masoumeh Safkhani, Quynh Le, Omed Hassan Ahmed, Mehdi Hosseinzadeh, Amir Masoud Rahmani, Nasour Bagheri

    Published 2023-12-01
    “…Abstract Physical Unclonable Functions (PUFs) are widely used in cryptographic authentication and key-agreement protocols due to their unique physical properties. …”
    Get full text
    Article