2015
DOI: 10.1109/tnano.2015.2397956
|View full text |Cite
|
Sign up to set email alerts
|

Investigation of Physically Unclonable Functions Using Flash Memory for Integrated Circuit Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(18 citation statements)
references
References 26 publications
0
18
0
Order By: Relevance
“…Another paper from this time frame was from Kim et al [54], who created a flash PUF in 2015 by programming a flash page to the statistical median of its threshold voltage. This threshold voltage range was then divided into a high and low section, with the lower half decoded as a logical "1" and the upper half as a logical "0".…”
Section: First Phase Of Developmentmentioning
confidence: 99%
“…Another paper from this time frame was from Kim et al [54], who created a flash PUF in 2015 by programming a flash page to the statistical median of its threshold voltage. This threshold voltage range was then divided into a high and low section, with the lower half decoded as a logical "1" and the upper half as a logical "0".…”
Section: First Phase Of Developmentmentioning
confidence: 99%
“…Arbiter PUF [7] is a typical strong PUF. SRAM PUF [9] and Glitch PUF [4]- [6] are typical weak PUFs. Ring oscillator (RO) PUF [8] can be used as both strong and weak PUF, but it only produces a limited number of CRPs which are not large enough for authentication.…”
Section: Introductionmentioning
confidence: 99%
“…PUF, broadly categorized as “weak PUF” and “strong PUF”, is an emerging low-cost on-chip secure primitive [ 2 , 4 , 5 , 6 , 7 ]. By converting the inherent uncontrollable and unpredictable variations of the semiconductor manufacturing process to a random digital bit string, a PUF generates a “response” upon a “challenge”, namely a challenge-response pair (CRP).…”
Section: Introductionmentioning
confidence: 99%
“…By converting the inherent uncontrollable and unpredictable variations of the semiconductor manufacturing process to a random digital bit string, a PUF generates a “response” upon a “challenge”, namely a challenge-response pair (CRP). Weak PUFs target the application of the key generation [ 2 , 4 ], while strong PUFs are more suitable for the device authentication [ 8 ]. The weak PUFs generally have very few CRPs.…”
Section: Introductionmentioning
confidence: 99%