4.3 Article

Reliable and efficient PUF-based cryptographic key generator using bit self-tests

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database

Urbi Chatterjee et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Hardware & Architecture

A Reliable Strong PUF Based on Switched-Capacitor Circuit

Zhangqing He et al.

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS (2018)

Article Computer Science, Theory & Methods

Cherry-Picking Reliable PUF Bits With Differential Sequence Coding

Matthias Hiller et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Hardware & Architecture

Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis

Jeroen Delvaux et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2015)

Article Computer Science, Hardware & Architecture

Secure and Robust Error Correction for Physical Unclonable Functions

Meng-Day (Mandel) Yu et al.

IEEE DESIGN & TEST OF COMPUTERS (2010)

Article Computer Science, Theory & Methods

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Yevgeniy Dodis et al.

SIAM JOURNAL ON COMPUTING (2008)