Physical unclonable functions for device authentication and secret key generation
Citations
977 citations
Cites background from "Physical unclonable functions for d..."
...The SRAM is an extreme example of a weak PUF in the sense that it only has one ‘‘CRP.’’ Note that since weak PUFs in general have only a small number of CRPs, these pairs must be kept secret....
[...]
[...]
834 citations
754 citations
639 citations
502 citations
Cites background from "Physical unclonable functions for d..."
...[5] B. Gassend, D. Clarke, M. van Dijk, and S. Devadas....
[...]
...Suh and Devadas [20] present a PUF based on ring oscillators...
[...]
...[13] D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas....
[...]
...Suh and Devadas [20] present a PUF based on ring oscillators which can also be implemented with the FPGA....
[...]
...[20] G. Edward Suh and Srinivas Devadas....
[...]
References
1,665 citations
"Physical unclonable functions for d..." refers methods in this paper
...For example, Pappu proposed an optical PUF, which uses the speckle patterns of optical medium for laser light [ 12 ]....
[...]
1,644 citations
"Physical unclonable functions for d..." refers background in this paper
...Section 7), this paper focuses on silicon PUFs (SPUFs) that are based on the hidden timing and delay information of integrated circuits [6, 7]....
[...]
...Physical Unclonable Functions (PUFs) [5, 6, 7] are innovative primitives to derive secrets from complex physical characteristics of ICs rather than storing the secrets in digital memory....
[...]
1,133 citations
"Physical unclonable functions for d..." refers background in this paper
...Non-volatile memory technologies are often vulnerable to invasive attack as secrets always exist in a digital form, and even battery-backed RAMs can be read after storing keys for a long time [1, 2, 14]....
[...]
1,002 citations
"Physical unclonable functions for d..." refers background in this paper
...(For an analysis of modelbuilding on arbiter PUFs see [8]....
[...]
...Because the PUF circuit is rather simple, attackers can try to construct a precise timing model and learn the parameters from many input-output pairs [8]....
[...]
751 citations
"Physical unclonable functions for d..." refers background in this paper
...It is widely known that significant process variations exist in IC fabrication making each IC unique [3, 4, 10]....
[...]