期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
1
作者 Ahmad O.Aseeri Sajjad Hussain Chauhdary +2 位作者 Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang 《Computers, Materials & Continua》 SCIE EI 2023年第4期1901-1918,共18页
IoT devices rely on authentication mechanisms to render secure message exchange.During data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted... IoT devices rely on authentication mechanisms to render secure message exchange.During data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT devices.The application of physical unclonable functions(PUFs)ensures secure data transmission among the internet of things(IoT)devices in a simplified network with an efficient time-stamped agreement.This paper proposes a secure,lightweight,cost-efficient reinforcement machine learning framework(SLCR-MLF)to achieve decentralization and security,thus enabling scalability,data integrity,and optimized processing time in IoT devices.PUF has been integrated into SLCR-MLF to improve the security of the cluster head node in the IoT platform during transmission by providing the authentication service for device-to-device communication.An IoT network gathers information of interest from multiple cluster members selected by the proposed framework.In addition,the software-defined secured(SDS)technique is integrated with SLCR-MLF to improve data integrity and optimize processing time in the IoT platform.Simulation analysis shows that the proposed framework outperforms conventional methods regarding the network’s lifetime,energy,secured data retrieval rate,and performance ratio.By enabling the proposed framework,number of residual nodes is reduced to 16%,energy consumption is reduced by up to 50%,almost 30%improvement in data retrieval rate,and network lifetime is improved by up to 1000 msec. 展开更多
关键词 Cyber-physical systems security data aggregation Internet of Things physical unclonable function swarm intelligences
下载PDF
Lightweight Authentication Protocol Based on Physical Unclonable Function
2
作者 Hanguang Luo Tao Zou +3 位作者 Chunming Wu Dan Li Shunbin Li Chu Chu 《Computers, Materials & Continua》 SCIE EI 2022年第9期5031-5040,共10页
In the emerging Industrial Internet of Things(IIoT),authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them... In the emerging Industrial Internet of Things(IIoT),authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them.The security protocol designed for resource-constrained systems should not only be secure but also efficient in terms of usage of energy,storage,and processing.Although recently many lightweight schemes have been proposed,to the best of our knowledge,they are unable to address the problem of privacy preservation with the resistance of Denial of Service(DoS)attacks in a practical way.In this paper,we propose a lightweight authentication protocol based on the Physically Unclonable Function(PUF)to overcome the limitations of existing schemes.The protocol provides an ingenious authentication and synchronization mechanism to solve the contradictions amount forward secrecy,DoS attacks,and resource-constrained.The performance analysis and comparison show that the proposed scheme can better improve the authentication security and efficiency for resource-constrained systems in IIoT. 展开更多
关键词 LIGHTWEIGHT AUTHENTICATION physically unclonable functions
下载PDF
Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function 被引量:8
3
作者 Ji-Liang Zhang Qiang Wu +5 位作者 Yi-Peng Ding Yong-Qiang Lv Qiang Zhou Zhi-Hua Xia Xing-Ming Sun Xing-Wei Wang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2016年第1期124-136,共13页
Physical unclonable function (PUF) makes use of the uncontrollable process variations during the production of IC to generate a unique signature for each IC. It has a wide application in security such as FPGA intell... Physical unclonable function (PUF) makes use of the uncontrollable process variations during the production of IC to generate a unique signature for each IC. It has a wide application in security such as FPGA intellectual property (IP) protection, key generation and digital rights management. Ring oscillator (RO) PUF and Arbiter PUF are the most popular PUFs, but they are not specially designed for FPGA. RO PUF incurs high resource overhead while obtaining less challenge-response pairs, and requires "hard macros" to implement on FPGAs. The arbiter PUF brings low resource overhead, but its structure has big bias when it is mapped on FPGAs. Anderson PUF can address these weaknesses of current Arbiter and RO PUFs implemented on FPGAs. However, it cannot be directly implemented on the new generation 28 nm FPGAs. In order to address these problems, this paper designs and implements a delay-based PUF that uses two LUTs in an SLICEM to implement two 16-bit shift registers of the PUF, 2-to-1 multiplexers in the carry chain to implement the multiplexers of the PUF, and any one of the 8 flip-flops to latch 1-bit PUF signatures. The proposed delay-based PUF is completely realized on 28 nm commercial FPGAs, and the experimental results show its high uniqueness, reliability and reconfigurability. Moreover, we test the impact of aging on it, and the results show that the effect of aging on the proposed PUF is insignificant, with only 6% bit-flips. Finally, the prospects of the proposed PUF in the FPGA binding and volatile key generation are discussed. 展开更多
关键词 physical unclonable function (PUF) FPGA intellectual property protection fabrication variation hardware security
原文传递
A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
4
作者 Liquan Chen Jinlong Wang +2 位作者 Bangwei Yin Kunliang Yu Jinguang Han 《China Communications》 SCIE CSCD 2023年第5期198-216,共19页
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ... With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency. 展开更多
关键词 Internet of Things end-edge-cloud orchestration secure communication physical unclonable function authentication key agreement
下载PDF
Crypto primitive of MOCVD MoS_(2) transistors for highly secured physical unclonable functions 被引量:1
5
作者 Bangjie Shao Tsz Hin Choy +5 位作者 Feichi Zhou Jiewei Chen Cong Wang Yong Ju Park Jong-Hyun Ahn Yang Chai 《Nano Research》 SCIE EI CAS CSCD 2021年第6期1784-1788,共5页
Physically unclonable crypto primitives have potential applications for anti-counterfeiting,identification,and authentication,which are clone proof and resistant to variously physical attack.Conventional physical uncl... Physically unclonable crypto primitives have potential applications for anti-counterfeiting,identification,and authentication,which are clone proof and resistant to variously physical attack.Conventional physical unclonable function(PUF)based on Si complementary metal-oxide-semiconductor(CMOS)technologies greatly suffers from entropy loss and bit instability due to noise sensitivity.Here we grow atomically thick MoS2 thin film and fabricate field-effect transistors(FETs).The inherently physical randomness of MoS2 transistors from materials growth and device fabrication process makes it appropriate for the application of PUF device.We perform electrical characterizations of MoS2 FETs,collect the data from 448 devices,and generate PUF keys by splitting drain current at specific levels to evaluate the response performance.Proper selection of splitting threshold enables to generate binary,ternary,and double binary keys.The generated PUF keys exhibit good randomness and uniqueness,providing a possibility for harvesting highly secured PUF devices with two-dimensional materials. 展开更多
关键词 transition metal DICHALCOGENIDES two-dimensional materials physical unclonable function metal-organic chemical vapor deposition field-effect transistor
原文传递
Security Enhancement of Arbiter-Based Physical Unclonable Function on FPGA 被引量:1
6
作者 WANG Jun LIU Shubo +1 位作者 XIONG Xingxing LIANG Cai 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期127-133,共7页
In order to reduce physical unclonable fixnction (PUF) response instability and imbalance caused by the metastability and the bias of arbiter, this paper uses an improved balanced D flip-plop (DFF) based on the un... In order to reduce physical unclonable fixnction (PUF) response instability and imbalance caused by the metastability and the bias of arbiter, this paper uses an improved balanced D flip-plop (DFF) based on the unbalanced DFF to reduce the bias in response output and enhances the security of PUF by adopting two balanced DFFs in series. The experimental results show that two cascaded balanced DFFs improve the stability of the DFF, and the output of two balanced DFFs is more reliable. The entropy of output is fixed at 98.7%. 展开更多
关键词 physical unclonable function METASTABILITY balanced D flip-flop field programmable gate arrays (FPGA) security
原文传递
A new physical unclonable function architecture
7
作者 白创 邹雪城 戴葵 《Journal of Semiconductors》 EI CAS CSCD 2015年第3期121-126,共6页
This paper describes a new silicon physical unclonable function (PUF) architecture that can be fabri- cated on a standard CMOS process. Our proposed architecture is built using process sensors, difference amplifier,... This paper describes a new silicon physical unclonable function (PUF) architecture that can be fabri- cated on a standard CMOS process. Our proposed architecture is built using process sensors, difference amplifier, comparator, voting mechanism and diffusion algorithm circuit. Multiple identical process sensors are fabricated on the same chip. Due to manufacturing process variations, each sensor produces slightly different physical charac- teristic values that can be compared in order to create a digital identification for the chip. The diffusion algorithm circuit ensures further that the PUF based on the proposed architecture is able to effectively identify a population of ICs. We also improve the stability of PUF design with respect to temporary environmental variations like temperature and supply voltage with the introduction of difference amplifier and voting mechanism. The PUF built on the proposed architecture is fabricated in 0.18 μm CMOS technology. Experimental results show that the PUF has a good output statistical characteristic of uniform distribution and a high stability of 98.1% with respect to temperature variation from -40 to 100 ℃, and supply voltage variation from 1.7 to 1.9 V. 展开更多
关键词 physical unclonable functions digital identification process sensors voting mechanism diffusion algorithm
原文传递
PUF-Based Key Distribution in Wireless Sensor Networks
8
作者 Zheng Zhang Yanan Liu +3 位作者 Qinyuan Zuo Lein Harn Shuo Qiu Yuan Cheng 《Computers, Materials & Continua》 SCIE EI 2020年第8期1261-1280,共20页
Physical Unclonable Functions(PUFs)can be seen as kind of hardware one-way functions,who are easily fabricated but difficult to clone,duplicate or predict.Therefore,PUFs with unclonable and unpredictable properties ar... Physical Unclonable Functions(PUFs)can be seen as kind of hardware one-way functions,who are easily fabricated but difficult to clone,duplicate or predict.Therefore,PUFs with unclonable and unpredictable properties are welcome to be applied in designing lightweight cryptography protocols.In this paper,a Basic Key Distribution Scheme(Basic-KDS)based on PUFs is firstly proposed.Then,by employing different deployment modes,a Random Deployment Key Distribution Scheme(RD-KDS)and a Grouping Deployment Key Distribution Scheme(GD-KDS)are further proposed based on the Basic-KDS for large scale wireless sensor networks.In our proposals,a sensor is not pre-distributed with any keys but will generate one by the embedded PUF when receiving a challenge from the gateway,which provides perfect resilience against sensor capture attacks.Besides,the unclonable and unpredictable properties of PUF guarantee the key uniqueness and two-way authentication.Analysis and experiment results show that our proposals have better performances in improving the resilience,secure-connectivity,and efficiency as compared to other schemes. 展开更多
关键词 Key distribution physical unclonable functions PUF wireless sensor networks deployment mode
下载PDF
A method to improve PUF reliability in FPGAs
9
作者 Liang Huaguo Li Weidi +1 位作者 Xu Xiumin Wang Haoyu 《Journal of Southeast University(English Edition)》 EI CAS 2018年第1期15-20,共6页
Due to the impact of voltage,temperature and device aging,the traditional ring oscillator-based physical unclonable functions(RO-PUF)suffers from a unreliability issue,i.e.,PUF output is subject to a constant change.T... Due to the impact of voltage,temperature and device aging,the traditional ring oscillator-based physical unclonable functions(RO-PUF)suffers from a unreliability issue,i.e.,PUF output is subject to a constant change.To improve the reliability of the PUF,a stability test scheme related to the PUF mapping unit is proposed.The scheme uses ring oscillators with multiple complexity and various frequencies as sources of interference,which are placed near the PUF prototype circuit to interfere with it.By identifying and discarding unstable slices whichlead to t e instability of PUF,PUF reliability can be effectively improved.Experimental results show that surrounding logic circuits with multiple complexity and multiple frequencies can identify different unstable slices,a d the higher the complexity,t e more unstable slices are detected.Moreover,compared with newly published PUF literature,t e PUF cicuit possesses better statistical characteristic of randomness and lower resource consumption.W it temperatures varying from 0 to 120 t and voltage fluctuating between 0.85 and 1.2 V,its uniqueness and stability can achieve 49.78%a d 98.00%,respectively,which makes it better for use in t e field of security. 展开更多
关键词 field programmable gate aray(FPGA) physical unclonable function(PUF) security ring oscillator(RO) RELIABILITY
下载PDF
保护物联网免受黑客攻击的基础
10
作者 郭正伟 《中国集成电路》 2021年第11期18-23,30,共7页
随着连接到物联网(IoT)的设备数量不断增加,对这些设备的强大安全解决方案的需求持续增加。物联网的安全性绝不应是事后考虑,原因在于产品被破坏会导致高达数千万美元的巨额损失和责任索赔。您可以提前支付安全费用或稍后支付巨额赔偿金... 随着连接到物联网(IoT)的设备数量不断增加,对这些设备的强大安全解决方案的需求持续增加。物联网的安全性绝不应是事后考虑,原因在于产品被破坏会导致高达数千万美元的巨额损失和责任索赔。您可以提前支付安全费用或稍后支付巨额赔偿金,但这永远不会是免费的。本文主要内容:一是阐述了通过查看需要保护的互联设备的最基本资产来解决安全需求:保护数据和对网络上的设备彼此进行身份验证所需的密钥和标识。这些敏感资产是任何安全架构的核心,需要保护其免受攻击者的攻击,以确保设备安全。二是介绍了需要这些资产的场景,从芯片供应商和设备制造商的角度思考,并比较了保护这些重要资产的不同方法。三是除了介绍存储敏感信息的传统方法外,还额外介绍了一种基于物理不可克隆函数(PUF)的方法。它显示了PUF的性能如何优于传统方法,特别是在将物联网有效扩展到数十亿设备的背景下、并从芯片和设备制造商的角度进行了分析。 展开更多
关键词 信任根(Root of Trust) PUF(physical unclonable function) SRAMPUF 非易失性存储器(NVM) 根密钥 安全芯片(SE)
下载PDF
Artificial optical microfingerprints for advanced anticounterfeiting
11
作者 Xueke Pang Qiang Zhang +7 位作者 Jingyang Wang Xin Jiang Menglin Wu Mingyue Cui Zhixia Feng Wenxin Xu Bin Song Yao He 《Nano Research》 SCIE EI CSCD 2024年第5期4371-4378,共8页
Artificial optical microfingerprints,known as physically unclonable functions(PUFs)offer a groundbreaking approach for anti-counterfeiting.However,these PUFs artificial optical microfingerprints suffer from a limited ... Artificial optical microfingerprints,known as physically unclonable functions(PUFs)offer a groundbreaking approach for anti-counterfeiting.However,these PUFs artificial optical microfingerprints suffer from a limited number of challenge-response pairs,making them vulnerable to machine learning(ML)attacks when additional error-correcting units are introduced.This study presents a pioneering demonstration of artificial optical microfingerprints that combine the advantages of PUFs,a large encoding capacity algorithm,and reliable deep learning authentication against ML attacks.Our approach utilizes the triple-mode PUFs,incorporating bright-field,multicolor fluorescence wrinkles,and the topography of surface enhanced Raman scattering in the mechanical and optical layers.Notably,the quaternary encoding of these PUFs artificial microfingerprints allows for an encoding capacity of 6.43×10^(24082) and achieves 100%deep learning recognition accuracy.Furthermore,the PUFs artificial optical microfingerprints exhibit high resilience against ML attacks,facilitated by generative adversarial networks(GAN)(with mean prediction accuracy of~85.0%).The results of this study highlight the potential of utilizing up to three PUFs in conjunction with a GAN training system,paving the way for achieving encoded information that remains resilient to ML attacks. 展开更多
关键词 artificial microfingerprints physically unclonable functions deep learning ANTI-COUNTERFEITING
原文传递
Insider Attack Prevention:LAPUP—Lightweight Authentication Protocol Using PUF
12
作者 Siranjeevi Rajamanickam Satyanarayana Vollala N.Ramasubramanian 《Journal of Communications and Information Networks》 EI CSCD 2024年第2期192-206,共15页
The incredible progress in technologies has drastically increased the usage of Web applications.Users share their credentials like userid and password or use their smart cards to get authenticated by the application s... The incredible progress in technologies has drastically increased the usage of Web applications.Users share their credentials like userid and password or use their smart cards to get authenticated by the application servers.Smart cards are handy to use,but they are susceptible to stolen smart card attacks and few other notable security attacks.Users prefer to use Web applications that guarantee for security against several security attacks,especially insider attacks,which is crucial.Cryptanalysis of several existing schemes prove the security pitfalls of the protocols from preventing security attacks,specifically insider attacks.This paper introduces LAPUP:a novel lightweight authentication protocol using physically unclonable function(PUF)to prevent security attacks,principally insider attacks.The PUFs are used to generate the security keys,challenge-response pair(CRP)and hardware signature for designing the LAPUP.The transmitted messages are shared as hash values and encrypted by the keys generated by PUF.These messages are devoid of all possible attacks executed by any attacker,including insider attacks.LAPUP is also free from stolen verifier attacks,as the databases are secured by using the hardware signature generated by PUFs.Security analysis of the protocol exhibits the strength of LAPUP in preventing insider attacks and its resistance against several other security attacks.The evaluation results of the communication and computation costs of LAPUP clearly shows that it achieves better performance than existing protocols,despite providing enhanced security. 展开更多
关键词 physically unclonable function(PUF) insiderattacks authenticationkeymanagementserver(AKMS) SECURITY
原文传递
A Survey on Silicon PUFs and Recent Advances in Ring Oscillator PUFs 被引量:9
13
作者 张吉良 屈钢 +1 位作者 吕勇强 周强 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第4期664-678,共15页
Silicon physical unclonable function (PUF) is a popular hardware security primitive that exploits the intrinsic variation of IC manufacturing process to generate chip-unique information for various security related ... Silicon physical unclonable function (PUF) is a popular hardware security primitive that exploits the intrinsic variation of IC manufacturing process to generate chip-unique information for various security related applications. For example, the PUF information can be used as a chip identifier, a secret key, the seed for a random number generator, or the response to a given challenge. Due to the unpredictability and irreplicability of IC manufacturing variation, silicon PUF has emerged as a promising hardware security primitive and gained a lot of attention over the past few years. In this article, we first give a survey on the current state-of-the-art of silicon PUFs, then analyze known attacks to PUFs and the countermeasures. After that we discuss PUF-based applications, highlight some recent research advances in ring oscillator PUFs, and conclude with some challenges and opportunities in PUF research and applications. 展开更多
关键词 physical unclonable function hardware security trusted IC VLSI FPGA
原文传递
A PUF-Based and Cloud-Assisted Lightweight Authentication for Multi-Hop Body Area Network 被引量:4
14
作者 Wang Xiao Tan Jiliang Zhang +3 位作者 Yuanjing Zhang Zheng Qin Yong Ding Xingwei Wang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第1期36-47,共12页
Wireless sensor technology plays an important role in the military,medical,and commercial fields nowadays.Wireless Body Area Network(WBAN)is a special application of the wireless sensor network in human health monitor... Wireless sensor technology plays an important role in the military,medical,and commercial fields nowadays.Wireless Body Area Network(WBAN)is a special application of the wireless sensor network in human health monitoring,through which patients can know their physical condition in real time and respond to emergencies on time.Data reliability,guaranteed by the trust of nodes in WBAN,is a prerequisite for the effective treatment of patients.Therefore,authenticating the sensor nodes and the sink nodes in WBAN is necessary.This paper proposes a lightweight Physical Unclonable Function(PUF)-based and cloud-assisted authentication mechanism for multi-hop body area networks,which compared with the star single-hop network,can enhance the adaptability to human motion and the integrity of data transmission.Such authentication mechanism can significantly reduce the storage overhead and resource loss in the data transmission process. 展开更多
关键词 physical unclonable function(PUF) hardware security Wireless Body Area Network(WBAN)
原文传递
ePUF: A Lightweight Double Identity Verification in IoT 被引量:2
15
作者 Bo Zhao Pengyuan Zhao Peiru Fan 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第5期625-635,共11页
Remote authentication is a safe and verifiable mechanism.In the Internet of Things (loT),remote hosts need to verify the legitimacy of identity of terminal devices.However,embedded devices can hardly afford sufficient... Remote authentication is a safe and verifiable mechanism.In the Internet of Things (loT),remote hosts need to verify the legitimacy of identity of terminal devices.However,embedded devices can hardly afford sufficient resources for the necessary trusted hardware components.Software authentication with no hardware guarantee is generally vulnerable to various network attacks.In this paper,we propose a lightweight remote verification protocol.The protocol utilizes the unique response returned by Physical Unclonable Function (PUF) as legitimate identity basis of the terminal devices and uses quadratic residues to encrypt the PUF authentication process to perform a double identity verification scheme.Our scheme is secure against middleman attacks on the attestation response by preventing conspiracy attacks from forgery authentication. 展开更多
关键词 Internet of Things(IoT) Identity-Based Encryption(IBE) physically unclonable functions(PUFs)
原文传递
Design of a reliable PUF circuit based on R–2R ladder digital-to-analog convertor
16
作者 汪鹏君 张学龙 +1 位作者 张跃军 李建瑞 《Journal of Semiconductors》 EI CAS CSCD 2015年第7期130-133,共4页
A novel physical unclonable functions (PUF) circuit is proposed, which relies on non-linear characteristic of analog voltage generated by R-2R ladder DAC. After amplifying the deviation signal, the robustness of the... A novel physical unclonable functions (PUF) circuit is proposed, which relies on non-linear characteristic of analog voltage generated by R-2R ladder DAC. After amplifying the deviation signal, the robustness of the DAC-PUF circuit has increased significantly. The DAC-PUF circuit is designed in TSMC 65 nm CMOS technology and the layout occupies 86.06 × 63.56μm^2. Monte Carlo simulation results show that the reliability of the DAC-PUF circuit is above 98% over a comprehensive range of environmental variation, such as temperature and supply voltage. 展开更多
关键词 process variation digital-to-analog convertor physical unclonable functions sense amplifier
原文传递
A Novel RRAM Based PUF for Anti-Machine Learning Attack and High Reliability
17
作者 DAI Lan YAN Qiangqiang +2 位作者 YI Shengyu LIU Wenkai QIAN He 《Journal of Shanghai Jiaotong university(Science)》 EI 2019年第1期101-106,共6页
Due to the unique response mechanism, physical unclonable function(PUF) has been extensively studied as a hardware security primitive. And compared to other PUFs, the resistive random access memory(RRAM)based PUF has ... Due to the unique response mechanism, physical unclonable function(PUF) has been extensively studied as a hardware security primitive. And compared to other PUFs, the resistive random access memory(RRAM)based PUF has more flexibility with the change of conductive filaments. In this work, we propose an exclusive or(XOR) strong PUF based on the 1 Kbit 1-transistor-1-resistor(1 T1 R) arrays, and unlike the traditional RRAM based strong PUF, the XOR PUF has a stronger anti-machine learning attack ability in our experiments. The reliability of XOR RRAM PUF is determined by the read instability, thermal dependence of RRAM resistance,and aging. We used a split current distribution scheme to make the reliability of XOR PUF significantly improved.After baking for 50 h at a high temperature of 150?C, the intra-chip Hamming distance(Intra-HD) only increased from 0 to 4.5%. The inter-chip Hamming distance(Inter-HD) and uniformity are close to 50%(ideally). And it is proven through the NIST test that XOR PUF has a high uniqueness. 展开更多
关键词 physical unclonable functions resistive random access memory machine learning attack anti-machine learning attack XOR RRAM PUF
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部