2021
DOI: 10.1109/access.2021.3123867
|View full text |Cite
|
Sign up to set email alerts
|

Digitization Algorithms in Ring Oscillator Physically Unclonable Functions as a Main Factor Achieving Hardware Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…For this reason, it is quite often used in the literature, although this evaluation pattern could be exploited by side channel attacks [22]. A detailed study of different approaches to generate the responses in this kind of PUFs and its impact on several parameters such as total entropy, entropy per oscillator and entropy per bit can be found in [23].…”
Section: B Measured Parametersmentioning
confidence: 99%
“…For this reason, it is quite often used in the literature, although this evaluation pattern could be exploited by side channel attacks [22]. A detailed study of different approaches to generate the responses in this kind of PUFs and its impact on several parameters such as total entropy, entropy per oscillator and entropy per bit can be found in [23].…”
Section: B Measured Parametersmentioning
confidence: 99%
“…In fact, there are several RO-PUF architectures depending on the comparison pattern used. In this work, the 2-masking architecture has been used, which consists of comparing the oscillators in pairs so that any oscillator is repeated in each comparison [19].…”
Section: Architecture Of a Ro-pufmentioning
confidence: 99%