scispace - formally typeset
A

Alexander A. Ivaniuk

Researcher at Belarusian State University of Informatics and Radioelectronics

Publications -  19
Citations -  194

Alexander A. Ivaniuk is an academic researcher from Belarusian State University of Informatics and Radioelectronics. The author has contributed to research in topics: Arbiter & Computer science. The author has an hindex of 6, co-authored 11 publications receiving 124 citations.

Papers
More filters
Journal ArticleDOI

Reliable and Modeling Attack Resistant Authentication of Arbiter PUF in FPGA Implementation With Trinary Quadruple Response

TL;DR: This paper presents a robust device authentication method based on the FPGA implementation of a reliability enhanced A-PUF with trinary digit (trit) quadruple responses and the proposed authentication protocol has been experimentally evaluated to be practically secure against various machine learning attacks.
Proceedings ArticleDOI

Multi-valued Arbiters for quality enhancement of PUF responses on FPGA implementation

TL;DR: A new multi-arbiter approach to extract more entropy to extend the number of response bits to a single challenge at the expense of a relatively small FPGA resource overhead is presented.
Book ChapterDOI

Design and Implementation of High-Quality Physical Unclonable Functions for Hardware-Oriented Cryptography

TL;DR: This chapter presents an extensive review of the techniques proposed in the recent years for the design and implementation of high-quality and/or alternative PUF instances with marginal overhead.
Proceedings ArticleDOI

Low-cost fortification of arbiter PUF against modeling attack

TL;DR: An approach to reduce the vulnerability of A-PUF to machine learning attacks without compromising its high reliability and uniqueness by utilizing a multiple input signature register (MISR) to process the input challenges.
Proceedings ArticleDOI

FPGA implementation of modeling attack resistant arbiter PUF with enhanced reliability

TL;DR: This work dichotomize the challenges to winnow out the unreliably weak challenges and obfuscate the remaining reliable strong challenges to increase its unpredictability against machine learning attacks.