2010
DOI: 10.1007/978-3-642-14452-3_1
|View full text |Cite
|
Sign up to set email alerts
|

Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

2
284
0
2

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 382 publications
(288 citation statements)
references
References 46 publications
2
284
0
2
Order By: Relevance
“…Determining whether (or to what extent) current PUF candidates actually satisfy the PUF assumption is an active area of research (e.g., [28,5]) but is out of the scope of this work. For a survey on PUF's candidates the reader can refer to [31], while a security analysis of silicon PUFs is provided in [28].…”
mentioning
confidence: 99%
“…Determining whether (or to what extent) current PUF candidates actually satisfy the PUF assumption is an active area of research (e.g., [28,5]) but is out of the scope of this work. For a survey on PUF's candidates the reader can refer to [31], while a security analysis of silicon PUFs is provided in [28].…”
mentioning
confidence: 99%
“…Maes et al [8] and Katzenbeisser et al [9] consider options and bounds for environmental factors in which variation between responses R 1 ← F (C), R 2 ← F (C) of a particular challenge on one single PUF ("intra-distance") are stable, while on the other hand the difference between responses R 1 ← F 1 (C), R 2 ← F 2 (C) to the same challenge on two different PUF instantiations ("inter-distance") becomes distinguishably large. In this context it is of major importance that efficient error correction is accounted for to compensate the intra-distance noise.…”
Section: The Problem Of Error Correctionmentioning
confidence: 99%
“…A Physically Obfuscated Key [8], on the other hand, can substitute for a secret key stored in hardware. It is assumed that no attacker is able to circumvent the access protocol and directly read the response.…”
Section: Strong Puf Physically Obfuscated Keys and Controlled Pufsmentioning
confidence: 99%
See 2 more Smart Citations