2014
DOI: 10.1109/msp.2014.123
|View full text |Cite
|
Sign up to set email alerts
|

Physical Unclonable Functions: A Primer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…Physically unclonable functions or features (PUFs) leverage random manufacturing variations and nonlinearities to derive an immutable device identifier [125][126][127][128][129] and can be used for detecting and avoiding counterfeits. We distinguish PUFs from fingerprints in that PUFs are intentionally added to a circuit to leverage the randomness in a manufacturing process to engineer a random, but repeatable, behavior.…”
Section: Physically Unclonable Functionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Physically unclonable functions or features (PUFs) leverage random manufacturing variations and nonlinearities to derive an immutable device identifier [125][126][127][128][129] and can be used for detecting and avoiding counterfeits. We distinguish PUFs from fingerprints in that PUFs are intentionally added to a circuit to leverage the randomness in a manufacturing process to engineer a random, but repeatable, behavior.…”
Section: Physically Unclonable Functionsmentioning
confidence: 99%
“…The second type of PUFs use digital circuits. Implementations, applications, and potential weaknesses of digital PUFs are reviewed in [125,126,129]. One standard use of a digital PUF is to authenticate the chip through a challenge-response approach.…”
Section: Physically Unclonable Functionsmentioning
confidence: 99%
“…PUFs can be used not just for identification and authentication. The authentication can be repeated after a system is assembled or resold, protecting against counterfeit ICs being inserted throughout a system's lifecycle (Bauer and Hamlet 2014).…”
Section: Anti-counterfeitingmentioning
confidence: 99%
“…The design of a secure communication scheme for the resource constraint IoT devices is the main challenge of the researchers 22,23 . Moreover, remote authentication 24‐33 is needed to set up efficient and secure communication between the user and the remote server. In order to deal with security, confidentiality, and access right only authorized user can access resources related to the cloud server 34‐37 .…”
Section: Introductionmentioning
confidence: 99%