Silicon physical random functions
Proceedings of the 9th ACM conference on Computer and communications security
Physical one-way functions
Toward an automated verification of certificates of authenticity
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Identification and authentication of integrated circuits: Research Articles
Concurrency and Computation: Practice & Experience - Computer Security
Certifying authenticity via fiber-infused paper
ACM SIGecom Exchanges
High-performance CMOS variability in the 65-nm regime and beyond
IBM Journal of Research and Development - Advanced silicon technology
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
FPGA Intrinsic PUFs and Their Use for IP Protection
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Anti-counterfeiting with a Random Pattern
SECURWARE '08 Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Modeling attacks on physical unclonable functions
Proceedings of the 17th ACM conference on Computer and communications security
The glitch PUF: a new delay-PUF architecture exploiting glitch shapes
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Extracting secret keys from integrated circuits
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
A Formalization of the Security Features of Physical Functions
SP '11 Proceedings of the 2011 IEEE Symposium on Security and Privacy
A formal study of power variability issues and side-channel attacks for nanoscale devices
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Lightweight and secure PUF key storage using limits of machine learning
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Read-proof hardware from protective coatings
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
A systematic evaluation of compact hardware implementations for the rijndael s-box
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
A stochastic model for differential side channel cryptanalysis
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
PUFKY: a fully functional PUF-based cryptographic key generator
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Security analysis of image-based PUFs for anti-counterfeiting
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Hi-index | 0.00 |
Physically Unclonable Functions are more and more important in the design of secure hardware, as they can ensure properties that conventional cryptography can not. In this paper we clarify the relations between strong PUFs and their unpredictability. For this purpose we first introduce an alternative definition for physical unpredictability, where the adversary can probe the physical responses of the Physical Function. We then illustrate physical unpredictability with a new instance of a PUF, based on the variability of the power consumption of a 65-nanometer chip. For this new PUF, we also evaluate the relation between robustness, unclonability and physical unpredictability. Our new definitions highlights the importance for designers to take into account if physical probing is possible or not (since the power of modeling attacks highly depends on this assumption). It also suggests that physical unpredictability is a generally useful tool for evaluating the unclonability of PUFs (since it can generate warning signals regarding the independence assumption that is frequently exploited for this purpose).