Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
19
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(19 citation statements)
references
References 11 publications
0
19
0
Order By: Relevance
“…It emphasizes the need for protocols to be robust enough. Recent research focus on using Deep Learning (DL) [117], [118], genetic programming [119], and Artificial Neural Networks (ANN) [120], [121] based techniques to model the design with reduced error and improved prediction accuracy of 64-bit and 128-bit CRPs.…”
Section: Mathematical Modeling Of Lspufmentioning
confidence: 99%
See 2 more Smart Citations
“…It emphasizes the need for protocols to be robust enough. Recent research focus on using Deep Learning (DL) [117], [118], genetic programming [119], and Artificial Neural Networks (ANN) [120], [121] based techniques to model the design with reduced error and improved prediction accuracy of 64-bit and 128-bit CRPs.…”
Section: Mathematical Modeling Of Lspufmentioning
confidence: 99%
“…Furthermore, obtaining CRPs is found indeed successful using SCA [124] and cryptanalysis [96]. [117] uses the gradient-based numerical optimization method to model the iPUF (4,4) with a training time of 5.23 minutes. This method uses the knowledge of parity vectors obtained from the challenge.…”
Section: H Modeling Attack On Lspufmentioning
confidence: 99%
See 1 more Smart Citation
“…That is, an adversary can mimic the PUF by building a mathematical model using a small number of CRPs. We note that several successful attacks have been reported in the literature against the APUF architectures [23], [24], [25], [26], [27], [28], [29]. To improve the robustness of APUF against classical ML based modeling attacks, an XOR APUF was proposed in [5] to XOR the multiple APUFs outputs, all having the same challenge input.…”
Section: Introductionmentioning
confidence: 99%
“…However, hardware cost of XOR PUF as well as the percentage of unstable responses exponentially increase with the increasing number of APUF components in an XOR PUF [31]. Moreover, in recent years, different variants of the modeling attacks have been reported to break XOR PUF architectures when given sufficient CRPs [23], [24], [25], [26], [29], [30], [31], [32], [33]. Several approaches have been introduced that utilize pre-extracted delay parameters to improve the security of XOR APUFs [32], [34], [35].…”
Section: Introductionmentioning
confidence: 99%