A Fourier analysis based attack against physically unclonable functions
From MaRDI portal
Publication:2656945
DOI10.1007/978-3-662-58387-6_17zbMATH Open1460.94044OpenAlexW2970174148MaRDI QIDQ2656945FDOQ2656945
Authors: Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
Publication date: 17 March 2021
Full work available at URL: https://doi.org/10.1007/978-3-662-58387-6_17
Recommendations
- Strong machine learning attack against PUFs with no mathematical model
- The gap between promise and reality: on the insecurity of XOR arbiter PUFs
- Analysis of the strict avalanche criterion in variants of arbiter-based physically unclonable functions
- Efficient power and timing side channels for physical unclonable functions
- Protecting ring oscillator physical unclonable functions against modeling attacks
machine learningnoise sensitivityPAC learningBoolean analysisphysically unclonable functionslow degree algorithm
Cited In (4)
- Analysis of the strict avalanche criterion in variants of arbiter-based physically unclonable functions
- A theoretical framework for the analysis of physical unclonable function interfaces and its relation to the random oracle model
- Strong machine learning attack against PUFs with no mathematical model
- A framework to enhance security of physically unclonable functions using chaotic circuits
This page was built for publication: A Fourier analysis based attack against physically unclonable functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2656945)