Filters








93 Hits in 5.3 sec

Efficient Fuzzy Extraction Of Puf-Induced Secrets: Theory And Applications

Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day Yu
<span title="2016-08-17">2016</span> <i title="Zenodo"> Zenodo </i> &nbsp;
Apart from an inherent reduction in implementation footprint, the newly developed theory also facilitates the analysis of state-of-the-art error-correction methods for PUFs.  ...  Fuzzy extractors transform this noisy non-uniformly distributed secret into a stable high-entropy key.  ...  Applications The newly developed theory of Section 3 facilitates the design and analysis of error-correction methods, as exemplified in twofold manner.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.55449">doi:10.5281/zenodo.55449</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/472252ayczdsnnzo3zjk2edg7i">fatcat:472252ayczdsnnzo3zjk2edg7i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922224926/https://zenodo.org/record/55449/files/HECTOR-Fuzzy-Extraction-PUF-2016.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b8/61/b861978ee2703c1dd4bc7f76362b36a8a9ce4094.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.55449"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications [chapter]

Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day Yu
<span title="">2016</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Apart from an inherent reduction in implementation footprint, the newly developed theory also facilitates the analysis of state-of-the-art error-correction methods for PUFs.  ...  Fuzzy extractors transform this noisy non-uniformly distributed secret into a stable high-entropy key.  ...  Applications The newly developed theory of Section 3 facilitates the design and analysis of error-correction methods for PUFs, as exemplified in twofold manner.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53140-2_20">doi:10.1007/978-3-662-53140-2_20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/famnb652sreyld2sbg77x5sicy">fatcat:famnb652sreyld2sbg77x5sicy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160809081536/http://eprint.iacr.org/2015/854.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c0/4e/c04e6c6be353acb2f521fa97a5a6be2722c11f5e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53140-2_20"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Signal Processing for Cryptography and Security Applications [chapter]

Miroslav Knežević, Lejla Batina, Elke De Mulder, Junfeng Fan, Benedikt Gierlichs, Yong Ki Lee, Roel Maes, Ingrid Verbauwhede
<span title="">2010</span> <i title="Springer US"> Handbook of Signal Processing Systems </i> &nbsp;
Finally, we talk about fuzzy secrets and point out the use of DSP techniques for an important role in cryptography -a key derivation.  ...  Embedded devices need both an efficient and a secure implementation of cryptographic primitives.  ...  Working with Fuzzy Secrets Fuzzy Secrets: Properties and Applications in Cryptography Secrets play an important role in cryptography, since the alleged security of many cryptographic schemes is solely  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4419-6345-1_7">doi:10.1007/978-1-4419-6345-1_7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/we7ukic54fa2vfg2zznsxohzbi">fatcat:we7ukic54fa2vfg2zznsxohzbi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809164035/https://www.esat.kuleuven.be/cosic/publications/article-2146.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1c/aa/1caa22bc7d78086cd5092d807f9204b57e13381b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4419-6345-1_7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Signal Processing for Cryptography and Security Applications [chapter]

Miroslav Knežević, Lejla Batina, Elke De Mulder, Junfeng Fan, Benedikt Gierlichs, Yong Ki Lee, Roel Maes, Ingrid Verbauwhede
<span title="">2013</span> <i title="Springer New York"> Handbook of Signal Processing Systems </i> &nbsp;
Finally, we talk about fuzzy secrets and point out the use of DSP techniques for an important role in cryptography -a key derivation.  ...  Embedded devices need both an efficient and a secure implementation of cryptographic primitives.  ...  Working with Fuzzy Secrets Fuzzy Secrets: Properties and Applications in Cryptography Secrets play an important role in cryptography, since the alleged security of many cryptographic schemes is solely  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4614-6859-2_7">doi:10.1007/978-1-4614-6859-2_7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/krxcafuknvc5vfxukjza7vow4e">fatcat:krxcafuknvc5vfxukjza7vow4e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809164035/https://www.esat.kuleuven.be/cosic/publications/article-2146.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1c/aa/1caa22bc7d78086cd5092d807f9204b57e13381b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4614-6859-2_7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security

Dooho Choi, Seung-Hyun Seo, Yoon-Seok Oh, Yousung Kang
<span title="">2018</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rkvmqtb3orhy5h6d5ccjzgxej4" style="color: black;">IEEE Internet of Things Journal</a> </i> &nbsp;
We also give a prototype implementation for ensuring the feasibility of our two-factor fuzzy commitment concept by utilizing the image data and PUF data for two noisy factors.  ...  The proposed method utilizes two noisy factors from the inside and outside of the IoT device.  ...  Fuzzy extractor based on code-offset, i.e., fuzzy commitment, has been known to have information leakage between helper data and noisy input (secret) when the noisy input, e.g., PUF response, does not  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jiot.2018.2837751">doi:10.1109/jiot.2018.2837751</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4tpvzytxprhhbliasxwkvwgkze">fatcat:4tpvzytxprhhbliasxwkvwgkze</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201107191004/https://ieeexplore.ieee.org/ielx7/6488907/8651406/08360476.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/d2/f0d2d0edd74531511ddfd66e4b1bb03e38de6a35.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jiot.2018.2837751"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Analysis and experimental evaluation of image-based PUFs

Saloomeh Shariati, François-Xavier Standaert, Laurent Jacques, Benoit Macq
<span title="2012-09-23">2012</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/gdrobv2b4nethjlcdrncfwcmee" style="color: black;">Journal of Cryptographic Engineering</a> </i> &nbsp;
Binary Hashing, respectively, and code-offset fuzzy extraction.  ...  Physically unclonable functions (PUFs) are becoming popular tools for various applications, such as anticounterfeiting schemes.  ...  François-Xavier Standaert and Laurent Jacques are Associate Researchers of the Belgian Fund for Scientific Research (FNRS-F.R.S.).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s13389-012-0041-3">doi:10.1007/s13389-012-0041-3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lpwcnjsaebfmvna5vdxrvustau">fatcat:lpwcnjsaebfmvna5vdxrvustau</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810234122/http://static.springer.com/sgw/documents/1372029/application/pdf/JCEN_art%253A10.1007%252Fs13389-012-0041-3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1d/01/1d0146065bcc3e393350d18e212e0b89c5ca464e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s13389-012-0041-3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Security Analysis of PUF-based Key Generation and Entity Authentication

Jeroen Delvaux
<span title="2017-07-01">2017</span> <i title="Zenodo"> Zenodo </i> &nbsp;
PUFs can augment the security architecture of an ever-increasing number of electronic devices that access our personal data and/or represent our identities.  ...  Numerous newly revealed flaws and attacks are presented throughout this thesis. On the bright side, the lessons learned can help improve the quality of future PUF-based systems.  ...  Acknowledgements The authors acknowledge that the responses of a PUF are noisy and mention the existence of fuzzy extractors [39] as well.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.2643392">doi:10.5281/zenodo.2643392</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2pcr7p76qjbtnh36fuxsdk7enq">fatcat:2pcr7p76qjbtnh36fuxsdk7enq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201223123800/https://zenodo.org/record/2643392/files/thesis-290.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/26/21/262189d425776cbc874ca6d9a2bff5270ad70017.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.2643392"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions [article]

Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte
<span title="2021-02-08">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Physical security deals with the design and implementation of security measures fulfilling the practical requirements of cryptographic primitives, which are equally essential for classic and quantum ones  ...  Besides, proposals for quantum random number generation and quantum physically unclonable functions are compared to their classic counterparts and further analyzed to give a better understanding of their  ...  Invasive attacks on PUFs are capable of altering the physical structure of the PUFs leading to the extraction of decrypted data and completely changing the PUF configuration.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2005.04344v2">arXiv:2005.04344v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jstlhwebznfadf5g2zdri4sb6i">fatcat:jstlhwebznfadf5g2zdri4sb6i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200513011116/https://arxiv.org/pdf/2005.04344v1.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2005.04344v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Reconfigurable random bit storage using polymer-dispersed liquid crystal [article]

Roarke Horstmeyer, Sid Assawaworrarit, Changhuei Yang
<span title="2014-03-10">2014</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Cryptographic applications of such a volumetric memory device include use as a crypto-currency wallet and as a source of resettable "fingerprints" for time-sensitive authentication.  ...  We demonstrate how temporary application of a voltage above PDLC's saturation threshold can completely randomize (i.e., decorrelate) its optical scattering potential in less than a second.  ...  (a) The optical scattering response of PDLC decorrelates to different values as a function of DC voltage V and application time t.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1403.2419v1">arXiv:1403.2419v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wwbs4454ofcebdrxjzrzazfqxe">fatcat:wwbs4454ofcebdrxjzrzazfqxe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200927221239/https://arxiv.org/pdf/1403.2419v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f9/44/f944b3d16b52468a8ea70e95eb4da9e2f3912ea1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1403.2419v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Physically Unclonable Functions and AI: Two Decades of Marriage [article]

Fatemeh Ganji, Shahin Tajik
<span title="2021-02-11">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The main focus here is to explore the methods borrowed from AI to assess the security of a hardware primitive, namely physically unclonable functions (PUFs), which has found applications in cryptographic  ...  Metrics and procedures devised for this are further discussed. Moreover, By reviewing PUFs designed by applying AI techniques, we give insight into future research directions in this area.  ...  Throughout our Ph.D. studies at the Technical University of Berlin, and after that, his insightful comments and advice have helped us to broaden our knowledge and expand our horizons.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2008.11355v2">arXiv:2008.11355v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jxt5iueznzhqlmbcsbbgu3kzua">fatcat:jxt5iueznzhqlmbcsbbgu3kzua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200828215239/https://arxiv.org/pdf/2008.11355v1.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2008.11355v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Physical Unclonable Functions and Applications: A Tutorial

Charles Herder, Meng-Day Yu, Farinaz Koushanfar, Srinivas Devadas
<span title="">2014</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yfvtieuumfamvmjlc255uckdlm" style="color: black;">Proceedings of the IEEE</a> </i> &nbsp;
| This paper describes the use of physical unclonable functions (PUFs) in low-cost authentication and key generation applications.  ...  First, it motivates the use of PUFs versus conventional secure nonvolatile memories and defines the two primary PUF types: "strong PUFs" and "weak PUFs."  ...  Going forward, X serves as the ''fuzzy secret,'' and P e is public information. It has been proven by Maes et al. that revealing P e does not leak any min-entropy of the response X.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jproc.2014.2320516">doi:10.1109/jproc.2014.2320516</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5vlcesm54fhxjparjkhhu5dn6a">fatcat:5vlcesm54fhxjparjkhhu5dn6a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170507113723/http://trust-hub.org/publications/P9.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a1/da/a1da194a3f03d7d7216b03ee5ff408d6e070f4b3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jproc.2014.2320516"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

In-materio neuromimetic devices: Dynamics, information processing and pattern recognition [article]

Dawid Przyczyna, Piotr Zawal, Tomasz Mazur, Pier Luigi Gentili, Konrad Szaciłowski
<span title="2020-02-14">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Todays' microprocessors are devices of unprecedented complexity and MOSFET transistors are considered as the most widely produced artifact in the history of mankind.  ...  This feature article is devoted to various in materio implementation of neuromimetic processes, including neuronal dynamics, synaptic plasticity, and higher-level signal and information processing, along  ...  Some key concepts of Fuzzy logic Fuzzy logic has been defined as a rigorous logic of vague and approximate reasoning. 58 Fuzzy logic is based on the theory of fuzzy sets proposed by the engineer Lotfi  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2002.07712v1">arXiv:2002.07712v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/s7fgywfnrbhcrdndggeb7rulfu">fatcat:s7fgywfnrbhcrdndggeb7rulfu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200829082725/https://arxiv.org/ftp/arxiv/papers/2002/2002.07712.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cc/f9/ccf92bf783e25507cef4297987101a869dce7788.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2002.07712v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Secure and Robust Error Correction for Physical Unclonable Functions

Srinivas Devadas, Meng-Day Yu
<span title="">2015</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5hh6cgcjefdirnxwv2c2paxm4m" style="color: black;">IEEE design &amp; test</a> </i> &nbsp;
This deviation occurs because circuit delays do not vary uniformly with temperature and voltage. PUFs have two broad classes of applications.  ...  Given a fixed challenge as input, a PUF outputs a response that is unique to the manufacturing instance of the PUF circuit.  ...  and Proofs'' sidebar.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mdt.2009.163">doi:10.1109/mdt.2009.163</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mwepv32qr5agbkuwv3e7xgfwpq">fatcat:mwepv32qr5agbkuwv3e7xgfwpq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809195553/http://people.csail.mit.edu/devadas/pubs/secure-robust-ecc-puf.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fa/0f/fa0f71c2a60c4a049df0d2aa73874e2df20bfb13.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mdt.2009.163"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Secure and robust error correction for physical unclonable functions

Meng-Day Yu, Srinivas Devadas
<span title="">2010</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hkpx3vsnhrfb7jh6hlwads7olq" style="color: black;">IEEE Design &amp; Test of Computers</a> </i> &nbsp;
and Proofs'' sidebar.  ...  Acknowledgment We thank Marten van Dijk of the Massachusetts Inst. of Tech. for his valuable input to the draft, especially for his contribution to the proofs in the ''Mathematical Model for IBS Enmapper  ...  As an example, assume q ¼ 8, k ¼ 2, use of max/min criteria, and a simple decoder that looks at the sign bit of a PUF output value being pointed to by P to extract B 0 .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mdt.2010.25">doi:10.1109/mdt.2010.25</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ji2xmuzxlzdi3pbco6vwxbwjwy">fatcat:ji2xmuzxlzdi3pbco6vwxbwjwy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201107033724/https://dspace.mit.edu/bitstream/handle/1721.1/59809/Yu-2010-Secure%20and%20Robust%20Error%20Correction%20for%20Physical%20Unclonable%20Functions.pdf;jsessionid=3C2B1FBE14D79CBB17E0B640074334D2?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d1/ba/d1baba341d8d8296b5a53f48be0086796e249f2c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mdt.2010.25"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Application of learning algorithms in smart home IoT system security

Jian Mao, Qixiao Lin, Jingdong Bian
<span title="">2018</span> <i title="American Institute of Mathematical Sciences (AIMS)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7mvec7wnufaoneapm2vcaq2wny" style="color: black;">Mathematical Foundations of Computing</a> </i> &nbsp;
With the rapid development of Internet of Things (IoT) technologies, smart home systems are getting more and more popular in our daily life.  ...  Based on our proposed overall smart home system model, we investigate the application of learning algorithms in smart home IoT system security. Our study includes two angles.  ...  Machine learning evolved from the study of pattern recognition and computational learning theory in artificial intelligence.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3934/mfc.2018004">doi:10.3934/mfc.2018004</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ul4mbbpjrvgtdmkxqqv5sdwqum">fatcat:ul4mbbpjrvgtdmkxqqv5sdwqum</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200305103354/https://www.aimsciences.org/article/exportPdf?id=74a6ef7c-7063-41f5-af4f-741efb39b414" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/24/70/2470630302af7ec5f03a11d34ba47fdb33e10f20.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3934/mfc.2018004"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 93 results