Baek et al., 2021 - Google Patents
A reconfigurable SRAM based CMOS PUF with challenge to response pairsBaek et al., 2021
View PDF- Document ID
- 4745667580600970133
- Author
- Baek S
- Yu G
- Kim J
- Ngo C
- Eshraghian J
- Hong J
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
This paper presents a reconfigurable SRAM-based physically unclonable function (PUF) topology with multiple challenge-response pairs (CRPs) per cell. The proposed PUF structure enables a very large CRP space by connecting additional pull-up and pull-down …
- 230000004044 response 0 title abstract description 101
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- H—ELECTRICITY
- H03—BASIC ELECTRONIC CIRCUITRY
- H03K—PULSE TECHNIQUE
- H03K3/00—Circuits for generating electric pulses; Monostable, bistable or multistable circuits
- H03K3/84—Generating pulses having a predetermined statistical distribution of a parameter, e.g. random pulse generators
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Baek et al. | A reconfigurable SRAM based CMOS PUF with challenge to response pairs | |
| Hemavathy et al. | Arbiter PUF—A review of design, composition, and security aspects | |
| Alioto | Trends in hardware security: From basics to ASICs | |
| Yang et al. | Hardware designs for security in ultra-low-power IoT systems: An overview and survey | |
| Cao et al. | A low power diode-clamped inverter-based strong physical unclonable function for robust and lightweight authentication | |
| Holcomb et al. | Power-up SRAM state as an identifying fingerprint and source of true random numbers | |
| Lin et al. | Low-power sub-threshold design of secure physical unclonable functions | |
| Baturone et al. | Improved generation of identifiers, secret keys, and random numbers from SRAMs | |
| Zhao et al. | A 108 F 2/Bit fully reconfigurable RRAM PUF based on truly random dynamic entropy of jitter noise | |
| Cao et al. | An energy-efficient current-starved inverter based strong physical unclonable function with enhanced temperature stability | |
| Rahman et al. | Systematic correlation and cell neighborhood analysis of SRAM PUF for robust and unique key generation | |
| Li et al. | A 215-F² bistable physically unclonable function with an ACF of< 0.005 and a native bit instability of 2.05% in 65-nm CMOS process | |
| Mahalat et al. | Implementation, characterization and application of path changing switch based arbiter PUF on FPGA as a lightweight security primitive for IoT | |
| Zhao et al. | A 1036-F 2/bit high reliability temperature compensated cross-coupled comparator-based PUF | |
| US11861050B2 (en) | SR flip-flop based physical unclonable functions for hardware security | |
| Nam et al. | Compact SRAM-based PUF chip employing body voltage control technique | |
| Tehranipoor et al. | DVFT: A lightweight solution for power-supply noise-based TRNG using dynamic voltage feedback tuning system | |
| Chatterjee et al. | Theory and application of delay constraints in arbiter PUF | |
| Barbareschi et al. | A ring oscillator-based identification mechanism immune to aging and external working conditions | |
| Yehoshuva et al. | A survey of security attacks on silicon based weak PUF architectures | |
| Ni et al. | Pi puf: a processor-intrinsic puf for iot | |
| Tripathy et al. | MARPUF: physical unclonable function with improved machine learning attack resistance | |
| Rai et al. | Design and analysis of reconfigurable cryptographic primitives: TRNG and PUF | |
| Dehghanzadeh et al. | MBM PUF: A multi-bit memory-based physical unclonable function | |
| Bian et al. | A chaotic strong transition effect ring oscillator PUF with effective immunity to modeling attacks |