Multiple Observations for Secret-Key Binding with SRAM PUFs

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Alternative to Error Correction for SRAM-Like PUFs

We propose a new technique called stable-PUF-marking as an alternative to error correction to get reproducible (i.e. stable) outputs from physical unclonable functions (PUF). The concept is based on the influence of the mismatch on the stability of the PUF-cells’ output. To use this fact, cells providing a high mismatch between their crucial transistors are selected to substantially lower the e...

متن کامل

Low-temperature data remanence attacks against SRAM PUFs

In this paper, we present the first systematic investigation of data remanence effects on an intrinsic Static Random Access Memory Physical Unclonable Function (SRAM PUF) implemented on a commercial off-the-shelf (COTS) device in a temperature range between -110◦ C and -40◦ C. Although previous studies investigated data remanence in SRAMs only at temperatures above -50◦ C, our experimental resu...

متن کامل

Investigating SRAM PUFs in large CPUs and GPUs

Physically unclonable functions (PUFs) provide data that can be used for cryptographic purposes: on the one hand randomness for the initialization of random-number generators; on the other hand individual fingerprints for unique identification of specific hardware components. However, today’s off-the-shelf personal computers advertise randomness and individual fingerprints only in the form of a...

متن کامل

Secure Key Generation from Biased PUFs

PUF-based key generators have been widely considered as a root-of-trust in digital systems. They typically require an error-correcting mechanism (e.g. based on the code-offset method) for dealing with bit errors between the enrollment and reconstruction of keys. When the used PUF does not have full entropy, entropy leakage between the helper data and the device-unique key material can occur. If...

متن کامل

Secret-key Certificates (continued) Secret-key Certiicates (continued)

A new construction is described for designing secret-key certiicate schemes based on signature schemes other than of the Fiat-Shamir type. Also described are practical secret-key certiicate issuing protocols that enable the Certiication Authority to certify public keys, without being able to compromise the conndentiality of the corresponding secret keys. Furthermore the design of secure showing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Entropy

سال: 2021

ISSN: 1099-4300

DOI: 10.3390/e23050590