2018
DOI: 10.1109/tsm.2018.2818180
|View full text |Cite
|
Sign up to set email alerts
|

Making Use of Manufacturing Process Variations: A Dopingless Transistor Based-PUF for Hardware-Assisted Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 31 publications
(19 citation statements)
references
References 27 publications
0
19
0
Order By: Relevance
“…There are various architectures of PUF modules that were proposed which can be integrated into different applications [45,46]. A PUF uses the manufacturing variations that are introduced during the fabrication of an IC to generate the unique keys.…”
Section: The State-of-the-art In Blockchain Based Iot Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…There are various architectures of PUF modules that were proposed which can be integrated into different applications [45,46]. A PUF uses the manufacturing variations that are introduced during the fabrication of an IC to generate the unique keys.…”
Section: The State-of-the-art In Blockchain Based Iot Securitymentioning
confidence: 99%
“…We present various different FoMs of PUFs in Fig. 13 [45,27,58]. Figure 12: Working Principle of the Physical Unclonable Function [45,27].…”
Section: Figures-of-merit (Foms) Of Pufmentioning
confidence: 99%
“…Its high modelling complexity coupled with good uniformity and low native response reliability over a broad range of operating conditions are attractive for lightweight and low-cost authentication. 38 3.4x10 38 4.3x10 9 3.7x10 19…”
Section: Resultsmentioning
confidence: 99%
“…One of the most representative hardware solutions to reliably manage privacy information is using the physical characteristics of hardware to generate secret keys [9]. This solution is proposed by Bauder and Simmons in 1980s and is broadly accepted as a primitive trial to exploit physical properties of hardware for security purpose.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation