Articles with "physically related" as a keyword



Photo by hudsoncrafted from unsplash

Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3214089

Abstract: This paper initiates the study of “Cryptophasia in Hardware” – a phenomenon that allows hardware circuits/devices with no pre-established secret keys to securely exchange secret information over insecure communication networks. The study of cryptophasia is… read more here.

Keywords: key exchange; physically related; exchange; related functions ... See more keywords
Photo from wikipedia

Commitments via Physically Related Functions

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2023.3243495

Abstract: Commitment schemes are one of the basic building blocks to construct secure protocols for multi party computation. Many recent works are exploring hardware primitives like physically unclonable functions to build keyless cryptographic protocols, with minimal… read more here.

Keywords: hardware; physically related; via physically; security ... See more keywords