2019 IEEE 25th International Symposium on on-Line Testing and Robust System Design (IOLTS) 2019
DOI: 10.1109/iolts.2019.8854387
|View full text |Cite
|
Sign up to set email alerts
|

On the Encryption of the Challenge in Physically Unclonable Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…A PUF response could be affected by noise caused by power variation, and environmental conditions, e.g., temperature [57]. Such a noise is often mitigated by the incorporation of an error correction code (ECC) at the circuit-level.…”
Section: A System and Threat Modelsmentioning
confidence: 99%
“…A PUF response could be affected by noise caused by power variation, and environmental conditions, e.g., temperature [57]. Such a noise is often mitigated by the incorporation of an error correction code (ECC) at the circuit-level.…”
Section: A System and Threat Modelsmentioning
confidence: 99%
“…Despite being labelled as "weak", these PUFs have seen much more usage in practice as they generally have quite a high cost for an adversary to model [19,53]. Typically, weak PUFs are jointly considered with cryptographic methods [65] (e.g., encryption) to compensate for CRP scarcity.…”
Section: Puf Designs -Backgroundmentioning
confidence: 99%
“…These schemes enhance the security against ML-based modeling attacks at the expense of imposing high area overhead. For example, in the scheme proposed in [109], the target strong PUF receives an encrypted instead of a plain challenge. The encryption is performed by an embedded symmetric cipher whose key bits are generated via a weak PUF resided in the same chip.…”
Section: B Modeling Attacks On Pufs and Robustness Enhancementsmentioning
confidence: 99%