Fact-checked by Grok 2 weeks ago
References
-
[1]
[PDF] Controlled Physical Random FunctionsIn this paper, we introduce. Controlled Physical Random Functions (CPUFs) which are. PUFs that can only be accessed via an algorithm that is physically bound to ...
- [2]
-
[3]
[PDF] Silicon Physical Random Functions∗ - People | MIT CSAILThe focus of this paper is the silicon realization of PUFs, which we shall term silicon PUFs (SPUFs). Definition 2. A type of PUF is said to be Manufacturer.
-
[4]
Review of Physically Unclonable Functions (PUFs) - FrontiersFive different physically unclonable functions were explained: SRAM PUF, RO PUF, arbiter PUF, coating PUF and DRAM PUF as well as their structure and operation.
-
[5]
PUF-based Security Solutions for IoT: A SurveyDec 24, 2020 · This survey paper presents a review of the security challenges of emerging IoT networks and discusses some of the attacks and their countermeasures based on ...
- [6]
-
[7]
[PDF] Physical Unclonable Functions for Device Authentication and Secret ...Jun 8, 2007 · Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits ...
-
[8]
[PDF] On the Foundations of Physical Unclonable FunctionsJun 10, 2009 · Abstract. We investigate the foundations of Physical Unclonable Functions from several perspectives. Firstly, we discuss formal and ...
-
[9]
[PDF] Physical One-Way Functions - CBA-MITMar 2, 2001 · This dissertation introduces physical one-way functions and physical one-way hash functions as primitives for physical analogs of cryptosystems.Missing: PUF | Show results with:PUF
-
[10]
Physical one-way functions - DSpace@MITThis dissertation introduces physical one-way firnctions and physical one-way hash functions as primitives for physical analogs of cryptosystems.Missing: 2002 PUF
-
[11]
Silicon physical random functions | Proceedings of the 9th ACM ...We introduce the notion of a Physical Random Function (PUF). We argue that a complex integrated circuit can be viewed as a silicon PUF.
-
[12]
Hardware Intrinsic Security from Physically Unclonable FunctionsAug 10, 2015 · Additionally, SRAM PUFs can also be used as a source of randomness [22,137,227], for the realisation of (true or pseudo)random number generators ...<|control11|><|separator|>
-
[13]
[PDF] Physical Unclonable Functions for Device Authentication and Secret ...Jun 8, 2007 · ABSTRACT. Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics.
-
[14]
Classification, Evaluation, and Tradeoffs in PUFs - All About CircuitsJul 18, 2021 · A weak PUF is one that supports a small number of challenge-response pairs. Additionally, the number of CRPs that a weak PUF can generate may ...
-
[15]
[PDF] PUFs at a Glance - Security And Privacy Research GroupAbstract—Physical Unclonable Functions (PUFs) are a new, hardware-based security primitive, which has been introduced just about a decade ago. In this paper ...
-
[16]
A Weak-PUF-Assisted Strong PUF with Inherent Security Using ...The available CRPs of the DL-PUF design can reach up to 2 64 , and its robust security features are also demonstrated in this paper. We have implemented this ...
-
[17]
[PDF] A Formal Foundation for the Security Features of Physical FunctionsFirst, PUFs must be robust, i.e., able to provide stable outputs, since non-robust PUFs would significantly harm the efficiency of the underlying system.
-
[18]
A PUF taxonomy | Applied Physics Reviews - AIP PublishingFeb 12, 2019 · In general, implicit randomness arising in PUFs is preferable to explicit varieties, as naturally arising variation requires no additional ...
-
[19]
Strengthening Internet of Things Security: Surveying Physical ... - MDPIAn in-depth survey on the IoT that employs physically unclonable functions (PUFs) was conducted. The first contribution analyzes PUF-based authentication, ...
- [20]
-
[21]
Highly Reliable Magnetic Memory-Based Physical Unclonable ... - NIHMay 8, 2024 · We report highly reliable MRAM-based security devices, known as physical unclonable functions (PUFs), achieved by exploiting nanoscale perpendicular magnetic ...Missing: fluxgate sensors
-
[22]
Evaluation of SRAM PUF Characteristics and Generation of Stable ...Aug 4, 2025 · It is also proven that the stability of SRAM PUF can be increased to 99.999% and the bit error rate (BER) can be reduced to almost 0% by ...<|separator|>
-
[23]
A robust architecture of ring oscillator PUF: Enhancing cryptographic ...While those PUFs with a limited number of CRPs are categorized as weak PUFs, like RO-PUFs [5]. However, Weak PUFs offer better stability and unique response ...
-
[24]
[PDF] Deep Learning based Model Building Attacks on Arbiter PUF ...An n-bit input to a PUF instance, and the corresponding m-bit output generated by the PUF instance, together constitute a. “Challenge-Response Pair” (CRP). P ...
-
[25]
Design of Integrated Micro-Fluxgate Magnetic Sensors - MDPIThe present paper examines in detail the possibility of adopting a model based approach for designing miniaturized fluxgate sensors.Missing: PUF | Show results with:PUF<|control11|><|separator|>
-
[26]
Highly Reliable Magnetic Memory-Based Physical Unclonable ...May 8, 2024 · We report highly reliable MRAM-based security devices, known as physical unclonable functions (PUFs), achieved by exploiting nanoscale perpendicular magnetic ...
-
[27]
Physical One-Way Functions - SciencePhysical one-way functions use coherent transport through a disordered medium, using coherent multiple scattering from inhomogeneous structures, instead of ...
-
[28]
[PDF] Optical PUFs Reloaded - Cryptology ePrint ArchiveOptical PUFs are physical unclonable functions (PUFs) that are disordered systems reacting to external stimuli. This paper revisits and enhances their security.
-
[29]
Physically Unclonable Functions: A Study on the State of the Art and ...PDF | The idea of using intrinsic random physical features to identify objects, systems, and people is not new. Fingerprint identification of humans.
-
[30]
A guide for assessing optically imaged physically unclonable ...May 6, 2025 · Physically unclonable functions (PUFs) leverage inherently non-reproducible properties to generate unique IDs making them a technology with high ...
-
[31]
Nanoseed-based physically unclonable function for on-demand ...Apr 25, 2025 · This study introduces nanoseed-based PUFs that overcome the drawbacks of conventional PUFs using optical and electrical randomness originated from nanoseeds.
-
[32]
Physical unclonable in-memory computing for simultaneous ... - NatureJan 25, 2025 · We propose RePACK, a threefold data protection scheme that safeguards neural network input, weight, and structural information.
-
[33]
Nanoseed-based physically unclonable function for on-demand ...Apr 25, 2025 · This study introduces nanoseed-based PUFs that overcome the drawbacks of conventional PUFs using optical and electrical randomness originated from nanoseeds.
-
[34]
Encoder Decoder-Based Virtual Physically Unclonable Function for ...Encoder Decoder-Based Virtual Physically Unclonable Function for Internet of Things Device Authentication Using Split-Learning. January 2024.Missing: seeds | Show results with:seeds
-
[35]
[PDF] Computers & Security - University of CambridgeOct 30, 2024 · This paper presents a scheme that is based on the concept of split learning to construct an encoder–decoder-based Virtual PUF (VPUF) for device ...Missing: seeds remote
-
[36]
Vertically integrated security devices with physically unclonable ...Dec 25, 2024 · Three-dimensional (3D)-integrated security chip was realized with random number generation (RNG) and physically unclonable function (PUF).
-
[37]
Vertically integrated security devices with physically unclonable ...Physically unclonable function (PUF) and random number generation (RNG) are commonly used security tools to protect sensitive information from external threats.
-
[38]
Lattice-based Lightweight Scheme for Secure Communication in ...In this paper, we propose L^{2}S^{2}C^{2} , a novel post-quantum authentication protocol that leverages Physically Unclonable Functions (PUF) and Lattice-based ...
-
[39]
[PDF] Lattice PUF: A Strong Physical Unclonable Function Provably ... - arXivIn this paper, we propose a strong PUF that is secure against machine learning (ML) attacks with both classical and quantum computers. As a formal framework to ...
-
[40]
[PDF] Secure and Robust Error Correction for Physical Unclonable FunctionsThis code can be used to correct 30 errors out of 255 bits but is expensive to implement.Missing: seminal | Show results with:seminal
-
[41]
[PDF] Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and ...Sep 13, 2015 · Abstract. The device-unique response of a physically unclonable func- tion (PUF) can serve as the root of trust in an embedded cryptographic.Missing: seminal | Show results with:seminal
-
[42]
[PDF] Modeling Attacks on Physical Unclonable FunctionsABSTRACT. We show in this paper how several proposed Physical Un- clonable Functions (PUFs) can be broken by numerical mod- eling attacks.
-
[43]
[PDF] Attacking Arbiter PUFs Using Various Modeling Attack AlgorithmsJul 20, 2023 · APUF can be successfully attacked by several machine learning algorithms, such as Logistic Regression (LR) and. Covariance Matrix Adaptation ...
-
[44]
[PDF] Side-Channel Analysis of the TERO PUF - Cryptology ePrint ArchivePhysical side-channel attacks based on power or electromagnetic (EM) analysis, such as Differential Power Analysis (DPA) [10,17], have been subject to extensive.
-
[45]
[PDF] Robust Fuzzy Extractors and Helper Data Manipulation Attacks ...The first helper data manipulation attacks against PUF based key generation were not on fuzzy extractors, but on helper data algorithm based on pattern matching ...
- [46]
-
[47]
Logically reconfigurable PUFs: memory-based secure key storageIn this paper we introduce a new logically reconfigurable PUF (LR-PUF), based on a memory-based PUF. ... A single poly eeprom cell structure for use in standard ...
-
[48]
Physical one-way functions | Guide books - ACM Digital LibraryThis dissertation introduces physical one-way functions and physical one-way hash functions as primitives for physical analogs of cryptosystems. Physical one- ...
-
[49]
Blockchain-based authentication for IIoT devices with PUFIt is indispensable to authenticate devices in the IIoT environment. In this paper, we propose two blockchain-based authentication for IIoT devices with PUF.
- [50]
- [51]