2022
DOI: 10.1016/j.sysarc.2022.102514
|View full text |Cite
|
Sign up to set email alerts
|

A survey on silicon PUFs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 65 publications
0
6
0
Order By: Relevance
“…The three main types of silicon PUFs are delay-based PUFs, memory-based PUFs, and analog electronic PUFs. These classes can be divided depending on the many sources of variation [18].…”
Section: Puf and Machine Learning Attack On Pufmentioning
confidence: 99%
“…The three main types of silicon PUFs are delay-based PUFs, memory-based PUFs, and analog electronic PUFs. These classes can be divided depending on the many sources of variation [18].…”
Section: Puf and Machine Learning Attack On Pufmentioning
confidence: 99%
“…PUFs are often categorized into two major groups based on the fabrication method [36]: Silicon-Based PUFs: Silicon-based PUFs are created using variations in the manufacturing process of silicon chips or integrated circuits [5]. These variations are uncontrollable and unique to each device, making them suitable for generating device-specific and unpredictable responses.…”
Section: Based On Fabricationmentioning
confidence: 99%
“…This holds especially true for the Internet of Things (IoT) [1][2][3], which represents one of the central challenges, as it emerges in our personal lives and future industrial systems [4]. Physical unclonable functions (PUFs), which are used to create identifying strings and cryptographic keys, have become crucial as a hardware protection measure in recent years [5]. Physical unclonable functions (PUFs) have drawn a lot of interest because of their potential to offer strong security primitives for device authentication, safe key generation, and cryptographic protocols [6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…In contrast, other architectures require both identical placement and routing [11]. However, CROPUF consumes more resources than other SPUFs with the same number of CRPs like Arbiter [12] and Butterfly [13] PUFs. Also, the block is susceptible to modeling attacks based on Machine Learning (ML) [14].…”
Section: Introductionmentioning
confidence: 99%