搜索结果: 1-15 共查到“密码学 PUFs”相关记录37条 . 查询时间(0.015 秒)
Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs
transient effect ring oscillator true random number generator physically unclonable function
2019/7/15
In an article from CHES 2015, which appears in extended form in the Journal of Cryptology in 2019, Bernard, Haddad, Fischer, and Nicolai modeled the physical behavior of a transient effect ring oscill...
Theoretical and Practical Approaches for Hardness Amplification of PUFs
Hardness Amplification Complexity Theory FPGA Security
2019/5/23
The era of PUFs has been characterized by the efforts put into research and the development of PUFs that are robust against attacks, in particular, machine learning (ML) attacks. In the lack of system...
This paper studies the security of Ring Oscillator Physically Unclonable Function (PUF) with Enhanced Challenge-Response Pairs as proposed by Delavar et al. We present an attack that can predict all P...
Efficient Erasable PUFs from Programmable Logic and Memristors
Physical Unclonable Functions PUF Re-use Model Memristor Erasable PUFs
2018/4/19
At Oakland 2013, R{\"u}hrmair and van Dijk showed that many advanced PUF (Physical Unclonable Function)-based security protocols (e.g. key agreement, oblivious transfer, and bit commitment) can be vul...
Secure Code Updates for Smart Embedded Devices based on PUFs
Secure Code Update PUF Remote Attestation
2017/10/12
Code update is a very useful tool commonly used in low-end embedded devices to improve the existing functionalities or patch discovered bugs or vulnerabilities. If the update protocol itself is not se...
Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
secret-key cryptography XOR
2017/9/26
In a novel analysis, we formally prove that arbitrarily many Arbiter PUFs can be combined into a stable XOR Arbiter PUF. To the best of our knowledge, this design cannot be modeled by any known oracle...
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Higher-Order Alphabet PUFs Error-Correcting Codes
2017/9/25
Device-specific physical characteristics provide the foundation for PUFs, a hardware primitive for secure storage of cryptographic keys. So far, they have been implemented by either directly evaluatin...
To protect integrated circuits against IP piracy, Physically Unclonable Functions (PUFs) are deployed. PUFs provide a specific signature for each integrated circuit. However, environmental variations,...
Low-temperature data remanence attacks against intrinsic SRAM PUFs
Data remanence static random access memory (SRAM) physical unclonable function (PUF)
2016/12/10
In this paper, we present the first systematic investigation of data remanence effects on an intrinsic Static Random Access Memory Physical Unclonable Function (SRAM PUF) implemented on a commercial o...
Authenticated communication from Quantum Readout of PUFs
Physical Unclonable Functions quantum security
2016/12/8
Quantum Readout of Physical Unclonable Functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of da...
New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs
Physically uncloneable functions UC security hardware setup assumptions
2016/6/22
Brzuska \etal. (Crypto 2011) proved that unconditional UC-secure computation is possible if parties have access to honestly generated physically unclonable functions (PUFs). Dachman-Soled \etal. (Cryp...
Strong Machine Learning Attack against PUFs with No Mathematical Model
Machine Learning PAC Learning Boosting Technique
2016/6/15
Although numerous attacks revealed the vulnerability of different PUF families to non-invasive Machine Learning (ML) attacks, the question is still open whether all PUFs might be learnable. Until now,...
On Metrics to Quantify the Inter-Device Uniqueness of PUFs
PUF Physically Unclonable Function Uniqueness
2016/3/23
Physically Unclonable Functions (PUFs) have been an emerging topic in hardware security and trust in recent years, and many different kinds of PUFs have been presented in the literature. An important ...
Possibilities and Impossibilities for PUF Protocols under PUF Re-Use and PUFs-inside-PUFs Attacks
Physical Unclonable Functions Cryptographic Protocols
2016/3/23
We continue investigations on the use of so-called Strong PUFs as a cryptographic primitive in realistic attack models. We focus on two scenarios: Firstly, the {\it PUF re-use model}, where PUFs are b...
Practical DRAM PUFs in Commodity Devices
physical unclonable functions run-time accessible PUF DRAM PUFs
2016/3/9
A Physically Unclonable Function (PUF) is a unique and
stable physical characteristic of a piece of hardware, due to variations
in the fabrication processes. Prior works have demonstrated that PUFs
...