2010 International Conference on Microelectronics 2010
DOI: 10.1109/icm.2010.5696149
|View full text |Cite
|
Sign up to set email alerts
|

Hardware authentication based on PUFs and SHA-3 2<sup>nd</sup> round candidates

Abstract: Abstract-Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted. Silicon Physical Unclonable Functions (PUFs) or Physical Random Functions, which exploits manufacturing process variations in integrated circuits, have been used to authenticate the hardware in which they are included and, based on them, several cryptographic protocols have been reported. This paper … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2012
2012

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…PUFs are also used in the symmetric-key authentication protocol proposed by [12]. Finally, PUFs are applied to authentication of mobile sensor network nodes in [41].…”
Section: Signature Generationmentioning
confidence: 99%
“…PUFs are also used in the symmetric-key authentication protocol proposed by [12]. Finally, PUFs are applied to authentication of mobile sensor network nodes in [41].…”
Section: Signature Generationmentioning
confidence: 99%
“…Since the PUF behavior depends on the system where it is included, the PUF has not been studied alone (as reported in other works) but has been analyzed inside a whole security system, similar to that described in [9]. The system contains the PUF structure, a pseudo-random number generator of 32 bits based on non-linear feedback shift registers, and a short version of Keccak [b=400] sponge hash function with line width of 8 bits and 18 rounds [10].…”
Section: B Experimental Resultsmentioning
confidence: 99%
“…There is particular interest in applying PUFs' ability to generate unique signatures to enhancing the security of RFID authentication-just a few examples are [9,5,2]. PUFs are also used in the symmetric-key authentication protocol proposed by [12]. Finally, PUFs are applied to authentication of mobile sensor network nodes in [41].…”
Section: Signature Generationmentioning
confidence: 99%