2008
DOI: 10.1016/j.pmcj.2008.07.001
|View full text |Cite
|
Sign up to set email alerts
|

A tamper-proof and lightweight authentication scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(37 citation statements)
references
References 20 publications
0
36
0
Order By: Relevance
“…Similar toÖztürk et al, Hammouri et al [18] employ again two strong PUFs, as shown in Figure 7(e). As before, both PUFs are modeled during enrollment via an auxiliary one-time interface.…”
Section: Hammouri Et Al (December 2008)mentioning
confidence: 78%
See 2 more Smart Citations
“…Similar toÖztürk et al, Hammouri et al [18] employ again two strong PUFs, as shown in Figure 7(e). As before, both PUFs are modeled during enrollment via an auxiliary one-time interface.…”
Section: Hammouri Et Al (December 2008)mentioning
confidence: 78%
“…The server could send a list of true random numbers, requiring no additional IC logic, but resulting in a large communication overhead [18]. A small PRNG, such as a linear feedback shift register (LFSR), is often employed [10,18,31,40,46,59,61]. Challenge c is then used as seed value: r ← SPUF (PRNG(c)).…”
Section: Strong Puf Response Space Expansion (#5)mentioning
confidence: 99%
See 1 more Smart Citation
“…The notion of PAC learning has already been used in the context of PUFs by Hammouri et al [45] to assess the security of their proposed scheme. In order to do so, they represent a noiseless Arbiter PUF as an LTF [7], as first proposed in [39,62].…”
Section: Comparison With Related Workmentioning
confidence: 99%
“…An excellent recent survey has been published which summarizes the state-of-the-art in PUF-based authentication protocols [13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28] for resource-constraint devices [29]. The authentication protocols covered by the survey are evaluated according to: (1) resilience to environmental noise; (2) resilience to machine learning attacks; (3) the need to expand the response space of the strong PUF and (4) resilience to protocol attacks.…”
mentioning
confidence: 99%