Ring Oscillator Physical Unclonable Function with Multi ... - CiteSeerX

Jul 17, 2012 - ... we design a new type of ring oscillator PUF in which the different inverters .... new RO-PUF characterized by smaller design, highe...

0 downloads 2 Views 763KB Size

Recommend Documents

Jul 17, 2012 - semi-invasive attacks like physical tampering [1]–[3], whose goal is to obtain access to the key. Protecting the stored key against these attacks is vital for guaranteeing the security of ... designers who are trying to improve the s

Nov 14, 2017 - lations of a common centroid layout [3] 8-level barrel shifter in. 0.13 µm technology assess uniqueness, stability ... and commutativity test results based on post-layout simula- tions are presented in Section VI. ... The technique of

Nov 15, 2016 - H. Nili is with the Department of Electrical and Computer Engineering,. University of California, Santa Barbara, CA 93106 .... and unique to each device. condition [30]–[33]. While some CMOS PUFs are custom ..... Possible attacks on

May 11, 2016 - A silicon physically unclonable function (PUF) is considered to be one of the key security system solutions ... consequently power consumption is large, leading to difficulty in implementing RO-PUF in local devices. ... the RO frequenc

Feb 10, 2017 - A silicon physically unclonable function (PUF) using ring oscillators (ROs) has the advantage of easy application in both an ... have disadvantages: the number of RO pairs corresponds to the length of the ID, with the .... the coupling

Feb 21, 2018 - An important ingredient for a new cryptographic method are physical unclonable keys. (PUKs), also .... design an error-correcting polar code for a codeword of length N = 215 transmitted over N virtual channels. ..... Hillery, V. Buzek,

Jan 23, 2018 - cards (e.g., credit cards), at automatic teller machines, and point of sale terminals [1, 2]. The enrolment stage is performed only once by the manufacturer (or the .... In this work, we consider a rather sim- ple challenge, by assumin

Jan 27, 2015 - left with an uncertainty as large as the number of codewords. PUF. I r′ = c + e + e′. Helper. Data Ge- neration. II r = c + e e. Helper. Data. Storage. III e. Key. Repro- duction ... If an attacker is able to read e from the helper

Apr 20, 2017 - this case, information gain about the quantum state of a probe is limited by fundamental laws of quantum physics, and can be obtained only at the ... and robustness against key cloning, which are necessary for the protocol to be useful

information density photonic PUF devices that can be directly incorporated into integrated circuits to ensure authenticity and provide secure physical storage of private key material. I. INTRODUCTION. The globalization of the semiconductor manufactur

10, no. 3, pp. 489–498, 2011. [3] J. Wendt and M. Potkonjak, “Nanotechnology-based trusted remote sensing,” in IEEE Sensors Conference, 2011, pp. 1213–. 1216. [4] C. Huang, W. Shen, Y. Tseng et al., “A contact-resistive random-access-memory

pulse width reshaping. 0. 1. 0. 1 c o u n t e r fine time counter en clk pulse width reshaping pulse width reshaping pulse width reshaping ctrl_2 generator clk ctrl_2. En slow RO .... Circuit implementation and timing diagram of the clock extraction

threshold at different smoothing scales leading to the so called cloud-in-cloud problem. This issue is .... correction in κ [15]. However as it was shown in [23], deterministic barriers cannot be used in the excursion set theory consistently with th

using nested polar codes and the designs achieve privacy-leakage and storage ... O. ˙Iscan is with the Huawei European Research Center, Munich, Germany.

Apr 5, 2017 - Abstract. Physical Unclonable Functions (PUFs) exploit variations in the manufacturing process to derive bit sequences from integrated cir- cuits which can be used as secure cryptographic keys. Instead of storing the keys, they can be r

Apr 5, 2017 - lutional code library implemented by Walter Schnug, which serves as a ... M. Hiller, A. G. Önalan, G. Sigl, and M. Bossert, “Online Reliability ...

Jul 30, 2014 - Previous work on this topic used standard constructions, e.g. a concatenated scheme of a BCH and Repetition code in [3], which can be improved. The intention of this paper is to propose better code constructions for the application in

Feb 29, 2012 - Abstract—A wireless communication network is considered, consisting of a source (Alice), a destination (Bob) and an eavesdropper (Eve), each equipped with a single antenna. The communication is assisted by multiple helpers, each equi

Jan 26, 2015 - A novel classification scheme of the security objectives and mechanisms of PUFs is proposed and its usefulness to aid fu- ture research and security evaluation is demonstrated. One class of PUF security mechanisms that prevents an atta

Nov 23, 2016 - BCH and concatenated codes), [2], [3] (concatenation of a repetition and BCH code), [4]–[6] (generalized concatenated codes using RM and Reed–Solomon (RS) codes). So far, most publications about error correction for PUFs have tried

Sep 1, 2017 - Onur Günlü, Student Member, IEEE, Onurcan ˙Iscan, Vladimir Sidorenko, Member, IEEE, and Gerhard. Kramer, Fellow, IEEE ... outputs and the start-up behavior of static random access memories (SRAM) can serve as ... tion that is complem

Nov 8, 2016 - Section III summarizes known Secure Sketch schemes. In Section IV, we propose our new scheme. Section V provides examples. Finally, Section VI ... of memory cells. These devices are unclonable, since it is impossible to produce a device

Nov 23, 2016 - on the runtime both by masking techniques and by directly modifying ... So far, most publications about error correction for PUFs have tried to ...

Dec 21, 2017 - of the proposed multi-state machine learning technique to predict the drifts of the PUFs' responses in different ..... hard to extract by the hackers could also be erratic under noisy conditions. ... We also propose a multi-state and m