2020
DOI: 10.1049/el.2020.0344
|View full text |Cite
|
Sign up to set email alerts
|

Reliable and efficient PUF‐based cryptographic key generator using bit self‐tests

Abstract: This Letter proposes a reliable and lightweight key generator based on a novel bit-self-test arbiter physically unclonable function (BST-APUF). The BST-APUF adds a delay detection circuit into a classical APUF to automatically test the delay deviation that produces each bit of the PUF response and generates a reliability-flag for each response to indicate its reliability. The key generator collects robust responses and produces a secure key using a cryptographic entropy accumulator. FPGA implementation results… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 24 publications
(19 citation statements)
references
References 8 publications
0
19
0
Order By: Relevance
“…Compared with the F-GSG algorithm, the F-MI-GSG, and F-MI-GFG algorithms based on the data filtering technique and multiinnovation identification theory have higher parameter estimation accuracy. The proposed parameter identification algorithms for a nonlinear RBF-ARAR network in this article can be extended to other bilinear and nonlinear systems and can be applied to other areas [70][71][72][73][74] such as the information processing and transportation communication systems [75][76][77][78][79][80][81] and so on.…”
Section: Discussionmentioning
confidence: 99%
“…Compared with the F-GSG algorithm, the F-MI-GSG, and F-MI-GFG algorithms based on the data filtering technique and multiinnovation identification theory have higher parameter estimation accuracy. The proposed parameter identification algorithms for a nonlinear RBF-ARAR network in this article can be extended to other bilinear and nonlinear systems and can be applied to other areas [70][71][72][73][74] such as the information processing and transportation communication systems [75][76][77][78][79][80][81] and so on.…”
Section: Discussionmentioning
confidence: 99%
“…The proposed 2S-LS-MIESG algorithm in this article can joint some mathematical strategies 59,60 to explore new identification methods of linear and nonlinear stochastic systems [61][62][63][64] and can applied to other fields. [65][66][67][68] The pseudo-code of implementing the 2S-LS-MIESG algorithm is shown in Algorithm 2. Compute the gain vector L(t) and the covariance matrix P(t) by (49)-(50).…”
Section: E(p T) = E(t) Y(p T)mentioning
confidence: 99%
“…Equations (31) to (44) form the ML-ADE algorithm and the pseudocode of the ML-ADE algorithm is showed in Algorithm 2. The proposed approaches in the article can combine other mathematical tools [44][45][46][47][48] and statistical strategies [49][50][51][52][53] to study the performances of some parameter estimation algorithms of other linear stochastic systems and nonlinear stochastic systems with different structures and disturbance noises [54][55][56][57][58] and can be applied to literatures [59][60][61][62][63] such as article-making systems.…”
Section: The Ml-ade Algorithmmentioning
confidence: 99%