A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
[chapter]
2015
Lecture Notes in Computer Science
Since XOR Arbiter PUFs are one of the most popular and promising electrical strong PUF designs, our reliability-based machine learning attack raises doubts that secure and lightweight electrical strong ...
This is in stark contrast to the state-of-the-art machine learning attacks on XOR PUFs that are shown to have an exponential increase in challenge and responses. ...
We present the first cloning attack on a commercial strong PUF-based RFID tag, demonstrating the gap between the promised and achieved security with strong PUFs in practice. ...
doi:10.1007/978-3-662-48324-4_27
fatcat:55nibzb7bbh6ljxp5yjnnrskoi
Design and Evaluate Recomposited OR-AND-XOR-PUF
[article]
2022
arXiv
pre-print
Based on the space of challenge-response pairs (CRPs), it has two categories:weak PUF and strong PUF. ...
This work is to first evaluate the main PUF performance, in particular,uniformity and reliability of the OR-AND-XOR-PUF(OAX-PUF)-(x, y, z)-OAX-PUF. ...
We acknowledge support from the National Natural Science Foundation of China (62002167 and 61901209) and National Natural Science Foundation of JiangSu (BK20200461). ...
arXiv:2110.00909v3
fatcat:swltxedvozb6pm2qduj53ivtsi
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis
2015
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Security-critical products rely on the secrecy and integrity of their cryptographic keys. ...
We are the first to provide an in-depth and comprehensive literature overview on HDAs. Second, our analysis does expose new threats regarding helper data leakage and manipulation. ...
Bias means that 0 and 1 do not occur with equal probability. One often distinguishes between two categories of PUFs, depending on their scalability. ...
doi:10.1109/tcad.2014.2370531
fatcat:jdfurc2vkngfnfbgd67jgtfg4m
Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions
[article]
2021
arXiv
pre-print
Physical security deals with the design and implementation of security measures fulfilling the practical requirements of cryptographic primitives, which are equally essential for classic and quantum ones ...
This survey aims to draw greater attention to the importance of physical security, with a focus on secure key generation and storage as well as secure execution. ...
More concretely, such measures should be in place to narrow the gap between the characteristics of a cryptographic primitive implemented in reality and what is assumed about that cf. [Maes 2013 ]. ...
arXiv:2005.04344v2
fatcat:jstlhwebznfadf5g2zdri4sb6i
Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions
[article]
2020
Physical security deals with the design and implementation of security measures fulfilling the practical requirements of cryptographic primitives, which are equally essential for classic and quantum ones ...
This survey aims to draw greater attention to the importance of physical security, with a focus on secure key generation and storage as well as secure execution. ...
Acknowledgments The author would like to acknowledge the support of AFOSR under award number FA 9550-14-1-0351. ...
doi:10.48550/arxiv.2005.04344
fatcat:omcbbz2crfdcjfol43kepmpdjm
Aalborg Universitet Lightweight Cryptography for Passive RFID Tags Lightweight Cryptography for Passive RFID Tags
2011
unpublished
In the case of symmetric-key cryptography, we propose a stream cipher that has a footprint among the smallest in the published literature and aims at being implemented on printed electronics RFID tags. ...
This metric also has the advantage of being customizable, depending on the requirement of an integrator for a particular application. ...
There are also various IPUF, most often referred to simply as PUF (Physical Unclonable Function), such as: • architectures termed Arbiter PUFs [161] , • XOR Arbiter PUFs [161] , • Lightweight Secure ...
fatcat:lrxrgztwvvc7fkwl5efhykdl5a
Dagstuhl Reports, Volume 9, Issue 7, July 2019, Complete Issue
[article]
2020
For example, while the arbiter PUF is susceptible to model building, the XOR-composition of arbiter PUF was thought to prevent model-building of the components. ...
An example of that phenomenon can be seen in the composition of individual PUF using an XOR operation into a so-called XOR-PUF. ...
DNA, PUFs, etc.) ...
doi:10.4230/dagrep.9.7
fatcat:x4rfs6mnwfdztnbt6lghoavg6e