2022
DOI: 10.1007/s42979-022-01194-x
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 49 publications
0
4
0
Order By: Relevance
“…Kumar et al [72] provide a detailed explanation of a public/private key pair-based strategy for safeguarding the use of intellectual property cores in FPGAs. [129], (b) key sharing [130], (c) authentication [131], (d) software protection [132], (e) random number generation [16], (f) key generation [133], (g) ID generation [104] and (h) logic obfuscation [134].…”
Section: Ip Protectionmentioning
confidence: 99%
See 3 more Smart Citations
“…Kumar et al [72] provide a detailed explanation of a public/private key pair-based strategy for safeguarding the use of intellectual property cores in FPGAs. [129], (b) key sharing [130], (c) authentication [131], (d) software protection [132], (e) random number generation [16], (f) key generation [133], (g) ID generation [104] and (h) logic obfuscation [134].…”
Section: Ip Protectionmentioning
confidence: 99%
“…This per-device PUF setup step uses 2689 flip-flops and 2199 LUTs on the Xilinx Virtex-7 FPGA to limit the amount of space needed for PUFs and error correction during key generation. Chhabra et al [133] have integrated with the key-based hardware obfuscation of AES IP core by generating the cryptographic key using PUFs. Their experimental results also show that the proposed model is resilient against side-channel and SAT-based attacks.…”
Section: Secret Key Generationmentioning
confidence: 99%
See 2 more Smart Citations