Articles with "strong puf" as a keyword



Photo from wikipedia

Novel Strong-PUF-Based Authentication Protocols Leveraging Shamir’s Secret Sharing

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3065836

Abstract: Physical unclonable function (PUF) has emerged as an attractive hardware primitive for lightweight authentication in the Internet of Things (IoT). However, strong-PUF-based authentication schemes are threatened by powerful machine learning attacks. Therefore, dedicated lightweight protocols… read more here.

Keywords: authentication; strong puf; puf based; protocol ... See more keywords
Photo from wikipedia

A Weak PUF-Assisted Strong PUF With Inherent Immunity to Modeling Attacks and Ultra-Low BER

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Circuits and Systems I: Regular Papers"

DOI: 10.1109/tcsi.2022.3206214

Abstract: This paper presents a weak PUF-assisted strong PUF that combines the metrics between weak and strong PUFs. Unlike the conventional strong PUFs that rely on the nonlinear combination of a large number of entropy cells… read more here.

Keywords: assisted strong; puf assisted; strong puf; weak puf ... See more keywords