Secure key generation from biased PUFs
From MaRDI portal
Recommendations
- Hiding secrecy leakage in leaky helper data
- Efficient fuzzy extraction of PUF-induced secrets: theory and applications
- Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
- A PUF and software collaborative key protection scheme
- Short paper: XOR arbiter PUFs have systematic response bias
Cited in
(9)- Key extraction schemes for SRAM PUF
- scientific article; zbMATH DE number 1588481 (Why is no real title available?)
- Attacking PUF-based pattern matching key generators via helper data manipulation
- Detecting flawed masking schemes with leakage detection tests
- Hiding secrecy leakage in leaky helper data
- Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
- Efficient fuzzy extraction of PUF-induced secrets: theory and applications
- A PUF and software collaborative key protection scheme
- X-lock: a secure XOR-based fuzzy extractor for resource constrained devices
This page was built for publication: Secure key generation from biased PUFs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1695906)