2019
DOI: 10.3390/cryptography3030017
|View full text |Cite
|
Sign up to set email alerts
|

Key Generation for Hardware Obfuscation Using Strong PUFs

Abstract: As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries. Hardware obfuscation and IP locking can be used to make a design secure by replacing a part of the circuit with a key-locked module. In order to ensure each chip has unique keys, previous work has proposed using physical unclonable functions (PUF) to lock the circuit. However, these designs are area intensive. In this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…Kumar et al [72] provide a detailed explanation of a public/private key pair-based strategy for safeguarding the use of intellectual property cores in FPGAs. [129], (b) key sharing [130], (c) authentication [131], (d) software protection [132], (e) random number generation [16], (f) key generation [133], (g) ID generation [104] and (h) logic obfuscation [134].…”
Section: Ip Protectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Kumar et al [72] provide a detailed explanation of a public/private key pair-based strategy for safeguarding the use of intellectual property cores in FPGAs. [129], (b) key sharing [130], (c) authentication [131], (d) software protection [132], (e) random number generation [16], (f) key generation [133], (g) ID generation [104] and (h) logic obfuscation [134].…”
Section: Ip Protectionmentioning
confidence: 99%
“…To further provide stronger authentication and data encryption in IoT devices, the PUF-based obfuscation model is applied to the advanced encryption standard (AES) IP core. Quadir et al [134] proposed the key generation using strong PUFs for a hardware obfuscation scheme to uniquely lock each chip. This PUF-based hardware obfuscation method is evaluated on different ISCAS 85 benchmarks and also analyzed based on performance analysis.…”
Section: Logic Obfuscationmentioning
confidence: 99%
See 1 more Smart Citation