2022
DOI: 10.20944/preprints202209.0129.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Efficient RO-PUF for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems

Abstract: Generation of unique identifiers extracted from the physical characteristics of the underlying hardware ensures the protection of electronic devices against counterfeiting and provides security to the data they store and process. This work describes the design of an efficient Physical Unclonable Function (PUF) based on the differences in the frequency of Ring Oscillators (ROs) with identical layout due to variations in technological processes involved in the manufacture of the integrated circuit. The logic res… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…This paper presents a TRNG, developed from an existing RO-PUF circuit [10], designed in VHDL language for the Xilinx Zynq-7000 family devices and implemented on the Pynq-Z2 development board. This design also uses the strategy of comparing RO pairs to generate random bits, but differs from the last referenced work in the way the RO pairs are selected to perform such counts, allowing us to explore different competition strategies [11], which in our context represents different options to build a TRNG. Additionally, the collected bits are not exposed to any post-processing stage such as the Von Neumann or XOR correctors.…”
Section: Introductionmentioning
confidence: 99%
“…This paper presents a TRNG, developed from an existing RO-PUF circuit [10], designed in VHDL language for the Xilinx Zynq-7000 family devices and implemented on the Pynq-Z2 development board. This design also uses the strategy of comparing RO pairs to generate random bits, but differs from the last referenced work in the way the RO pairs are selected to perform such counts, allowing us to explore different competition strategies [11], which in our context represents different options to build a TRNG. Additionally, the collected bits are not exposed to any post-processing stage such as the Von Neumann or XOR correctors.…”
Section: Introductionmentioning
confidence: 99%