A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Key Reconciliation Protocols For Error Correction Of Silicon Puf Responses
2017
Zenodo
This is currently achieved using error-correcting codes in secure sketches, that generate helper data through a one-time procedure. As an alternative, we propose key reconciliation protocols. ...
Physical Unclonable Functions (PUFs) are promising primitives for the lightweight authentication of an integrated circuit (IC). ...
Fondation de Recherche pour l'Aéronautique et l'Espace", funding for this project was also provided by a grant from "La Région Rhône-Alpes". ...
doi:10.5281/zenodo.571744
fatcat:w7a42dlxbrcovlsvpxzhn4kq6i
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses
2017
IEEE Transactions on Information Forensics and Security
This is currently achieved using error-correcting codes in secure sketches, that generate helper data through a one-time procedure. As an alternative, we propose key reconciliation protocols. ...
Physical Unclonable Functions (PUFs) are promising primitives for the lightweight authentication of an integrated circuit (IC). ...
Fondation de Recherche pour l'Aéronautique et l'Espace", funding for this project was also provided by a grant from "La Région Rhône-Alpes". ...
doi:10.1109/tifs.2017.2689726
fatcat:pjdusbncpncjtpgidstacqta7i
Brand and IP protection with physical unclonable functions
2008
2008 IEEE International Symposium on Circuits and Systems
They can be turned into a useful tool to generate very secure secret keys in ICs and to provide keys to protect valuable IP of fabless IC companies, IP Vendors and design houses. ...
We will present several examples and explain cryptographic algorithms and protocols to use them in IP protection applications. ...
This error rate can be efficiently corrected via error correcting codes. ...
doi:10.1109/iscas.2008.4542135
dblp:conf/iscas/GuajardoKST08
fatcat:btue2qus7zg2nc5cff2uzmes5q
Hardware authentication based on PUFs and SHA-3 2nd round candidates
2010
2010 International Conference on Microelectronics
This paper describes the hardware implementation of a symmetric-key authentication protocol in which a PUF is one of the relevant blocks. ...
Silicon Physical Unclonable Functions (PUFs) or Physical Random Functions, which exploits manufacturing process variations in integrated circuits, have been used to authenticate the hardware in which they ...
To ensure correcting any possibly small error in the PUF response, a repetition code R(3,1) has been selected.
IV. ...
doi:10.1109/icm.2010.5696149
fatcat:m3lfe7gdsncqfmwa267jq3mvy4
Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection
2007
2007 International Conference on Field Programmable Logic and Applications
In this paper, we propose new protocols for the IP protection problem on FPGAs based on public-key (PK) cryptography, analyze the advantages and costs of such an approach, and describe a PUF intrinsic ...
To this end solutions have been proposed based on the idea of bitstream encryption, symmetric-key primitives, and the use of Physical Unclonable Functions (PUFs). ...
PUF-BASED IP AUTHENTICATION FOR FPGAS In this section, we introduce protocols based on PK encryption for protection of IP blocks. ...
doi:10.1109/fpl.2007.4380646
dblp:conf/fpl/GuajardoKST07
fatcat:svhzz6g72beghobug6ynizhp6m
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
2008
Information Systems Frontiers
In this paper, we provide solutions for secure key deployment and storage of keys in sensor networks and RFID systems based on the use of Physical Unclonable Functions (PUFs). ...
Our protocols are more efficient (round complexity) and allow for lower costs compared to previously proposed ones. ...
For our applications Q will be a finite field of characteristic p and often of characteristic two. Error Correcting Codes. ...
doi:10.1007/s10796-008-9142-z
fatcat:a5x7bzyvprexpflzg65wvpaphi
Intelligent Voltage Ramp-Up Time Adaptation for Temperature Noise Reduction on Memory-Based PUF Systems
2015
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
The efficiency and cost of silicon physically unclonable function (PUF)-based applications, and in particular key generators, are heavily impacted by the level of reproducibility of the bare PUF responses ...
Error-correcting codes (ECCs) can be used to achieve near-perfect reliability, but come at a high implementation cost especially when the underlying PUF is very noisy. ...
Information reconciliation is enabled by error correction blocks, while privacy amplification is enabled by hash function, see Fig. 7 . ...
doi:10.1109/tcad.2015.2422844
fatcat:rokkgtzm5jdknliwqpd3aj27qu
Authenticated secret key generation in delay-constrained wireless systems
2020
EURASIP Journal on Wireless Communications and Networking
All of the proposed mechanisms have the potential to pave the way for a new breed of latency aware security protocols. ...
Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. ...
Numerous practical information reconciliation approaches using standard forward error correction codes (e.g., LDPC, BCH) have been proposed [16, 75] . ...
doi:10.1186/s13638-020-01742-0
fatcat:qhpm5xingvhh5boj2pomy3rj4a
A Formalization of the Security Features of Physical Functions
2011
2011 IEEE Symposium on Security and Privacy
PUFs have recently been proposed for various applications, including anticounterfeiting schemes, key generation algorithms, and in the design of block ciphers. ...
However, currently only rudimentary security models for PUFs exist, limiting the confidence in the security claims of PUF-based security primitives. ...
ACKNOWLEDGEMENTS We thank Pim Tuyls for several useful discussions and the anonymous reviewers for their helpful comments. ...
doi:10.1109/sp.2011.10
dblp:conf/sp/ArmknechtMSSW11
fatcat:7oj5r3dldbcyncbib7ov6p3gfq
Physical Unclonable Functions and Their Applications to Vehicle System Security
2009
VTC Spring 2009 - IEEE 69th Vehicular Technology Conference
In addition, the suitability of PUFs for vehicle insurance applications is explained. ...
Recently Physical Unclonable Functions (PUFs) attracted significant interest for numerous applications such as protection of software and hardware IPs, secure key storages and components identification ...
Examples of PUFs include optical PUFs [28] , silicon PUFs [10] and coating PUFs [32] . ...
doi:10.1109/vetecs.2009.5073800
dblp:conf/vtc/AsimGKT09
fatcat:yormkgiv4rhirhljk2p4n5s32u
Authenticated Secret Key Generation in Delay Constrained Wireless Systems
[article]
2020
arXiv
pre-print
All of the proposed mechanisms, have the potential to pave the way for a new breed of latency aware security protocols. ...
Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. ...
LM contributed on the use of Effective Capacity within this framework. MM carried out the simulations and prepared the graphs. All authors contributed and edited the manuscript. ...
arXiv:2001.07162v2
fatcat:nae36pvpe5adxj7etxwoitv7aq
Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses
2019
IEEE Transactions on Information Forensics and Security
Overall, MRR greatly reduces the demand for the expected number of erroneous bits for correction and, subsequently, achieve a significant reduction in the error correction overhead. ...
Although the entropy extractor can be lightweight, the overhead of the secure sketch responsible correcting naturally noisy PUF responses is usually costly. ...
However, the ability to mount the attacks depends on: i) the error-correction code employed; and ii) the method used for error-correction. ...
doi:10.1109/tifs.2018.2886624
fatcat:k4fiob4ipvhrlggua4eetzigx4
TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs
[article]
2020
arXiv
pre-print
Although PUFs provide the potential for lightweight and secure authentication for increasing numbers of low-end Internet of Things devices, practical and secure mechanisms remain elusive. ...
can exploit the SimPUF to perform a trial-and-error search over likely error patterns to recover the noisy response to authenticate the prover. ...
Reconciling Response Errors In literature, stabilizing response errors usually targets the PUF based key generation application-works targeting authentication may choose [8] simple error correction code ...
arXiv:1807.11046v2
fatcat:xwwfmqwihjeqtl4dgbkgeofrkm
Security Analysis of PUF-based Key Generation and Entity Authentication
2017
Zenodo
PUFs usually need to team up with other building blocks, e.g., true random number generators (TRNGs), cryptographic algorithms, error-correcting codes, non-volatile memory (NVM), etc. ...
This building block can hence be understood as the silicon equivalent of human biometrics. ...
We therefore assume the complete absence of error-correction techniques, which makes the protocol non-functional. ...
doi:10.5281/zenodo.2643392
fatcat:2pcr7p76qjbtnh36fuxsdk7enq
Multi-factor Physical Layer Security Authentication in Short Blocklength Communication
[article]
2021
arXiv
pre-print
The SKG keys are incorporated in a zero-round-trip-time resumption protocol for fast re-authentication. ...
In this paper, we focus on short blocklengths and propose a fast, privacy preserving, multi-factor authentication protocol that uniquely combines PUFs, proximity estimation and SKG. ...
One of the main features of BCH codes during code design is the number of guaranteed correctable error bits. ...
arXiv:2010.14457v2
fatcat:x2botjix5bcwbe5g2bmybf4lme
« Previous
Showing results 1 — 15 out of 40 results