Physically Unclonable Functions 2018
DOI: 10.1007/978-3-319-76804-5_6
|View full text |Cite
|
Sign up to set email alerts
|

Hardware-Based Security Applications of Physically Unclonable Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 27 publications
0
9
0
Order By: Relevance
“…Later on, observing the results, if it matches the previously stored values, these third parties send the required key. [2] PUFs get stability over the readouts by utilising private key generation due to temperature variations, noise, and voltage variations, whereas PUF responses are not used directly as cryptographic keys. To overcome the problem of not using PUF responses, the two-phase algorithm is implemented, i.e., key generation and key extraction phases.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Later on, observing the results, if it matches the previously stored values, these third parties send the required key. [2] PUFs get stability over the readouts by utilising private key generation due to temperature variations, noise, and voltage variations, whereas PUF responses are not used directly as cryptographic keys. To overcome the problem of not using PUF responses, the two-phase algorithm is implemented, i.e., key generation and key extraction phases.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Whereas PUFs offer a high level of protection within low-cost authentication and without loading secret keys to the internet of things (IOT). [2] conclusIons This paper discussed serial physically unclonable functions (PUF), similar unclonable functions, and the design of a two-level finite state machine (FSM) using ring oscillators, scrambler, counters, and delay-based arbiter. In addition to this, we also focused on methodology, properties and applications of physically unclonable functions.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of PUF for building entity-authentication protocols has been extensively explored in the literature [20,21,22]. In general, each entity is provided with a PUF and the authentication scheme consists of two stages [23]:…”
Section: Physically Unclonable Functionmentioning
confidence: 99%
“…These hardware token require two or even three factors for authentication: for example, a card reader for online banking may require the presence of the reader, the presence of the bankcard and the correct pin number to log in. There has been plenty of previous research into systems involving a hardware token and using one securely as part of a larger system [2], [3][4][5][6][7][8][9]. This increases the strength of the authentication by needing multiple factors to be passed before access is allowed, however none of these factors require the intended user to be the one logging in.…”
Section: Introductionmentioning
confidence: 99%