Controlled physical random functions and applications
ACM Transactions on Information and System Security (TISSEC)
FPGA Intrinsic PUFs and Their Use for IP Protection
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
A Formalization of the Security Features of Physical Functions
SP '11 Proceedings of the 2011 IEEE Symposium on Security and Privacy
Read-proof hardware from protective coatings
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Breaking and entering through the silicon
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
FDTC '13 Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography
Hi-index | 0.00 |
Physically Unclonable Functions (PUF) are continuously being integrated into next generation security products. Nevertheless, their implementations and algorithms are the subject of much debate amongst the security community. One proposed use application for PUFs is replacing secure key storage. Yet the full unique PUF response of the most common type of PUFs can be recovered by using standard failure analysis equipment. SRAM PUFs used as key storage can only be considered to marginally improve security over conventional non-volatile key storage.