Lee et al., 2019 - Google Patents
RC PUF: A low-cost and an easy-to-design PUF for resource-constrained IoT devicesLee et al., 2019
- Document ID
- 9467956370439956714
- Author
- Lee S
- Oh M
- Kang Y
- Choi D
- Publication year
- Publication venue
- International Workshop on Information Security Applications
External Links
Snippet
A physically unclonable function (PUF) is a security primitive that can generate device- specific cryptographic information by extracting the features of hardware uncertainty. Despite the advantages of PUFs introduced over the past decade, the majority of them have to be …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Maes et al. | Physically unclonable functions: A study on the state of the art and future research directions | |
| US10211993B2 (en) | Analog push pull amplifier-based physically unclonable function for hardware security | |
| Wan et al. | An invasive-attack-resistant PUF based on switched-capacitor circuit | |
| Zhao et al. | A 108 F 2/Bit fully reconfigurable RRAM PUF based on truly random dynamic entropy of jitter noise | |
| Baek et al. | A reconfigurable SRAM based CMOS PUF with challenge to response pairs | |
| He et al. | ASCH-PUF: A “Zero” Bit error rate CMOS physically unclonable function with dual-mode low-cost stabilization | |
| KR20170094326A (en) | Reliability enhancement methods for physically unclonable function bitstring generation | |
| Li et al. | An area-efficient microprocessor-based SoC with an instruction-cache transformable to an ambient temperature sensor and a physically unclonable function | |
| WO2008015603A1 (en) | Device and method for generating a random bit string | |
| US11983303B2 (en) | Intrinsic data generation device, semiconductor device and authentication system | |
| Lee et al. | RC PUF: A low-cost and an easy-to-design PUF for resource-constrained IoT devices | |
| Zhang et al. | A SC PUF standard cell used for key generation and anti-invasive-attack protection | |
| Zhao et al. | A 1036-F 2/bit high reliability temperature compensated cross-coupled comparator-based PUF | |
| Yan et al. | On-chip thermal profiling to detect malicious activity: System-level concepts and design of key building blocks | |
| Liu et al. | An entropy-source-preselection-based strong puf with strong resilience to machine learning attacks and high energy efficiency | |
| Bryant et al. | A brief tutorial on mixed signal approaches to combat electronic counterfeiting | |
| CN108875417B (en) | Method for generating a PUF signature and device having a PUF | |
| Park et al. | A metal-via resistance based physically unclonable function with backend incremental adc | |
| Sadr et al. | Weighted Hamming distance for PUF performance evaluation | |
| Vooka et al. | Capacitance‐to‐digital converter for leaky capacitive sensors | |
| Yamashita et al. | Redshift: Manipulating signal propagation delay via continuous-wave lasers | |
| Lin et al. | A compact ultra-low power physical unclonable function based on time-domain current difference measurement | |
| Yu et al. | Leveraging balanced logic gates as strong PUFs for securing IoT against malicious attacks | |
| Sudhanya et al. | Study of different silicon physical unclonable functions | |
| Lee et al. | RC PUF: A Low-Cost and an Easy-to-Design |