IEEE/ACM International Symposium on Low Power Electronics and Design 2011
DOI: 10.1109/islped.2011.5993602
|View full text |Cite
|
Sign up to set email alerts
|

Matched public PUF: Ultra low energy security platform

Abstract: Abstract-Hardware-based physically unclonable functions (PUFs) leverage intrinsic process variation of modern integrated circuits to provide interesting security solutions but either induce high storage requirements or require significant resources of at least one involved party. We use device aging to realize two identical unclonable modules that cannot be matched with any third such module. Each device enables rapid, low-energy computation of ultra-complex functions that are too complex for simulation in any… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 27 publications
0
12
0
Order By: Relevance
“…It can also be used for a graduation of the PUF responses which is robust to PUF modeling attacks or for better statistical properties of the PUF by changing the PUF responses. Public PUFs (PPUFs) [39], [40], [41] leverage the aging to shape the PUF responses. The main purpose of applying aging to PPUFs is to make the responses of the PUFs, which are shared among the trusted parties, identical for low-power consumption and fast authentication.…”
Section: B Leveraging Aging To Pufs and Circuitsmentioning
confidence: 99%
“…It can also be used for a graduation of the PUF responses which is robust to PUF modeling attacks or for better statistical properties of the PUF by changing the PUF responses. Public PUFs (PPUFs) [39], [40], [41] leverage the aging to shape the PUF responses. The main purpose of applying aging to PPUFs is to make the responses of the PUFs, which are shared among the trusted parties, identical for low-power consumption and fast authentication.…”
Section: B Leveraging Aging To Pufs and Circuitsmentioning
confidence: 99%
“…This is achieved through the use of device aging and software disabling to reduce the computational requirement to only two clock cycles. The paradigm is that the delay of each transistor can be altered using device aging in such a way to create two identical PUFs after a subset of transistors is eliminated from the PUF using software techniques, such as special input selection [15], [16]. Much more research for implementing and evaluating this concept in current and pending technologies is still required.…”
Section: Security Paradigms For Puf Designmentioning
confidence: 99%
“…These implementations are intrinsically more resilient to attacks such as power and delay analysis attacks. They also enable a very low energy realization of public key protocols and can enable ultra fast protocols for many security protocols which are currently too slow to be practical [14], [15], [16]. There is also an ongoing effort to use PUFs to implement more complex security algorithms such as bit-commitment and oblivious transfer [19], [20].…”
Section: Public Key Cryptography and New Security Applicationsmentioning
confidence: 99%
“…GLC has enabled a variety of hardware-based security applications, such as hardware metering [6] [7], hardware trojan detection [8] and the creation of physically unclonable functions (PUFs) [9] [10]. The critical importance of GLC resulted in creation of a great variety of conceptually, statistically, and algorithmically different techniques, including: (i) direct measurements methods [11], (ii) field-programmable gate array (FPGA) reconfiguration-based approaches [12][13], (iii) schemes that embed and observe dedicated IC structures and specialized circuity [14], and (iv) non-destructive universal techniques that employ global measurements and calculate scaling factors of each gate by solving a system of equations [15] [16][17] [18].…”
Section: A Gate-level Characterization (Glc)mentioning
confidence: 99%