A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Physical Unclonable Functions and Applications: A Tutorial
2014
Proceedings of the IEEE
| This paper describes the use of physical unclonable functions (PUFs) in low-cost authentication and key generation applications. First, it motivates the use of PUFs versus conventional secure nonvolatile memories and defines the two primary PUF types: "strong PUFs" and "weak PUFs." It describes strong PUF implementations and their use for lowcost authentication. After this description, the paper covers both attacks and protocols to address errors. Next, the paper covers weak PUF
doi:10.1109/jproc.2014.2320516
fatcat:5vlcesm54fhxjparjkhhu5dn6a