DOI: 10.32657/10220/46622
|View full text |Cite
|
Sign up to set email alerts
|

Arbiter PUF based FPGA chip identification and authentication methods with enhanced reliability and modeling attack resistance

Abstract: I would like to express my gratitude to my supervisors for constant support and reasonable criticism of my research efforts. I doubt, that I could finish my Ph. D. study without their inspiration and passion about the research area I have chosen. First, I would like to thank Associate Professor Chang Chip-Hong, who offered me a research scholarship in Nanyang Technological University (NTU). It has been a great experience to work in world-class research group which is recognized all over the world. Prof. Chang … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 67 publications
0
1
0
Order By: Relevance
“…The variability of the PUF implementation on a chip of integrated circuits allows us to determine the main directions of PUF application [2]: digital watermarks and fingerprints [3], generation of random number sequences [4], identification and authentication [5], implementation of hardware hash functions [6], detection of hardware bugs [7], generation of encryption keys [8], radio frequency identifiers [9], etc.…”
Section: Development Of a Methods For Implicit Storage Of Key Informatmentioning
confidence: 99%
“…The variability of the PUF implementation on a chip of integrated circuits allows us to determine the main directions of PUF application [2]: digital watermarks and fingerprints [3], generation of random number sequences [4], identification and authentication [5], implementation of hardware hash functions [6], detection of hardware bugs [7], generation of encryption keys [8], radio frequency identifiers [9], etc.…”
Section: Development Of a Methods For Implicit Storage Of Key Informatmentioning
confidence: 99%