Secure lightweight entity authentication with strong PUFs: Mission impossible?
From MaRDI portal
Publication:5265093
Recommendations
- Towards a Unified Security Model for Physically Unclonable Functions
- Financial Cryptography and Data Security
- Physically uncloneable functions in the universal composition framework
- Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
- End-to-end design of a PUF-based privacy preserving authentication protocol
Cited in
(12)- Run-time accessible DRAM PUFs in commodity devices
- Analysis of the strict avalanche criterion in variants of arbiter-based physically unclonable functions
- Anonymous authentication scheme based on PUF
- Secure and private, yet lightweight, authentication for the IoT via PUF and CBKA
- Identities for embedded systems enabled by physical unclonable functions
- Survey of information security
- How do the arbiter PUFs sample the Boolean function class?
- Concealing KETJE: a lightweight PUF-based privacy preserving authentication protocol
- Photonic side-channel analysis of arbiter PUFs
- Leakage sources of the ICLooPUF: analysis of a side-channel protected oscillator-based PUF
- PUF-based mutual multifactor entity and transaction authentication for secure banking
- Efficient power and timing side channels for physical unclonable functions
This page was built for publication: Secure lightweight entity authentication with strong PUFs: Mission impossible?
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5265093)