Attacking PUF-based pattern matching key generators via helper data manipulation
From MaRDI portal
Recommendations
- Analysis of the strict avalanche criterion in variants of arbiter-based physically unclonable functions
- Physically unclonable functions. Constructions, properties and applications
- A framework to enhance security of physically unclonable functions using chaotic circuits
- Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs
- Secure key generation from biased PUFs
Cited in
(6)- A technique using PUFs for protecting circuit layout designs against reverse engineering
- Analysis and protection of the two-metric helper data scheme
- Analysis of the strict avalanche criterion in variants of arbiter-based physically unclonable functions
- Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
- A PUF and software collaborative key protection scheme
- X-lock: a secure XOR-based fuzzy extractor for resource constrained devices
This page was built for publication: Attacking PUF-based pattern matching key generators via helper data manipulation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5404748)