4.6 Article

Digitization Algorithms in Ring Oscillator Physically Unclonable Functions as a Main Factor Achieving Hardware Security

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

On the Adoption of Physically Unclonable Functions to Secure IIoT Devices

Mario Barbareschi et al.

Summary: This article discusses the adoption of PUFs in the Industrial Internet of Things context, proposing a Pseudo-PUF architecture that successfully implements advanced security primitives while meeting device resource constraints. Analysis shows good results with negligible impact on devices, making the approach suitable for IIoT deployments.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Proceedings Paper Engineering, Electrical & Electronic

Introduction to Physically Unclonable Fuctions: Properties and Applications

M. Garcia-Bosque et al.

24TH IEEE EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN (ECCTD 2020) (2020)

Article Computer Science, Information Systems

Proposal and Analysis of a Novel Class of PUFs Based on Galois Ring Oscillators

Miguel Garcia-Bosque et al.

IEEE ACCESS (2020)

Review Engineering, Electrical & Electronic

Physical unclonable functions

Yansong Gao et al.

NATURE ELECTRONICS (2020)

Review Physics, Applied

A PUF taxonomy

Thomas McGrath et al.

APPLIED PHYSICS REVIEWS (2019)

Proceedings Paper Automation & Control Systems

Hardware Assisted Chaos Based IoT Authentication

Hong Zhao et al.

PROCEEDINGS OF THE 2019 IEEE 16TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC 2019) (2019)

Article Computer Science, Information Systems

Building Caring Healthcare Systems in the Internet of Things

Phillip A. Laplante et al.

IEEE SYSTEMS JOURNAL (2018)

Article Multidisciplinary Sciences

Wireless physical layer security

H. Vincent Poor et al.

PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA (2017)

Article Computer Science, Information Systems

The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey

Charith Perera et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2015)

Article Engineering, Electrical & Electronic

Physical Unclonable Functions and Applications: A Tutorial

Charles Herder et al.

PROCEEDINGS OF THE IEEE (2014)

Article Computer Science, Theory & Methods

PUF Modeling Attacks on Simulated and Silicon Data

Ulrich Ruehrmair et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Theory & Methods

Min-entropy as a resource

Barbara Espinoza et al.

INFORMATION AND COMPUTATION (2013)

Article Computer Science, Theory & Methods

Improved Ring Oscillator PUF: An FPGA-friendly Secure Primitive

Abhranil Maiti et al.

JOURNAL OF CRYPTOLOGY (2011)

Article Computer Science, Information Systems

The Operational Meaning of Min- and Max-Entropy

Robert Koenig et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2009)

Article Physics, Multidisciplinary

How does the entropy/information bound work?

JD Bekenstein

FOUNDATIONS OF PHYSICS (2005)

Article Computer Science, Information Systems

Guesswork and entropy

D Malone et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2004)