2021
DOI: 10.1109/tcad.2020.2999907
|View full text |Cite
|
Sign up to set email alerts
|

Physically Unclonable and Reconfigurable Computing System (PURCS) for Hardware Security Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(8 citation statements)
references
References 52 publications
0
6
0
Order By: Relevance
“…PUF technology is based on the unpredictability resulting from the mismatched characteristics of circuits of the same design produced in a semiconductor manufacturing process [46][47] [48][49] [50]. As unique values are given to each semiconductor based on the fine differences that occur in a manufacturing process, the devices have unique responses to the same challenge value even though they have all been produced through the same process [51] [52].…”
Section: B Pufmentioning
confidence: 99%
“…PUF technology is based on the unpredictability resulting from the mismatched characteristics of circuits of the same design produced in a semiconductor manufacturing process [46][47] [48][49] [50]. As unique values are given to each semiconductor based on the fine differences that occur in a manufacturing process, the devices have unique responses to the same challenge value even though they have all been produced through the same process [51] [52].…”
Section: B Pufmentioning
confidence: 99%
“…The main characteristics of PUFs are reliability (it should always provide same CRPs), unpredictability (PUF CRPs should not be predicted based on other CRPs), unclonability (CRP mappings should be physically unclonable), and physical unbreakability (physical PUF modification should result of malfunction or permanent damage to chip as protection of chip integrity) [ 60 ]. Advantages of the PUFs are resistant to invasive attacks and have no need for extra programming, testing, and processing power [ 61 ].…”
Section: Hardware Assisted Security Of Fog Computing Devicesmentioning
confidence: 99%
“…The initial state sensitivity is popularly known as the 'butterfly effect', after being coined by Lorenz in a lecture [6], as if a butterfly flapped its wings in Brazil a few weeks earlier and as a result, eventually, that minor perturbation has changed the nice sunny weather in Texas into a tornado. This deterministic aperiodicity and the sensitive dependence on the initial state of chaotic systems have proven their utility in numerous security applications such as data encryption [7], random number generation [8], [9], reconfigurable logic [10], [11], Physically Unclonable Function (PUF) [12], side-channel attack mitigation [13], secure communication [14], logic obfuscation [15] and so on.…”
Section: Introductionmentioning
confidence: 99%