Potkonjak et al., 2011 - Google Patents
Differential public physically unclonable functions: architecture and applicationsPotkonjak et al., 2011
View PDF- Document ID
- 13792568021722517382
- Author
- Potkonjak M
- Meguerdichian S
- Nahapetian A
- Wei S
- Publication year
- Publication venue
- Proceedings of the 48th Design Automation Conference
External Links
Snippet
We have developed an ultra low power (well below 1 nano-joule per transaction), ultra high speed (less than 1 nanosecond), and low cost (a few hundred gates) public physically unclonable function (PPUF). We have also developed the first PPUF-based smart card (SC) …
- 238000004088 simulation 0 description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Card specific authentication in transaction processing
- G06Q20/4097—Mutual authentication between card and transaction partners
- G06Q20/40975—Use of encryption for mutual authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Potkonjak et al. | Differential public physically unclonable functions: architecture and applications | |
Shamsoshoara et al. | A survey on physical unclonable function (PUF)-based security solutions for Internet of Things | |
Liang et al. | A double PUF-based RFID identity authentication protocol in service-centric internet of things environments | |
Yang et al. | Hardware designs for security in ultra-low-power IoT systems: An overview and survey | |
Majzoobi et al. | Techniques for design and implementation of secure reconfigurable PUFs | |
Rührmair et al. | Security based on physical unclonability and disorder | |
Wendt et al. | Hardware obfuscation using PUF-based logic | |
Zhang et al. | A survey on silicon PUFs and recent advances in ring oscillator PUFs | |
Herder et al. | Physical unclonable functions and applications: A tutorial | |
Kong et al. | PUFatt: Embedded platform attestation based on novel processor-based PUFs | |
Halak | Physically unclonable functions | |
US9032476B2 (en) | Secure authentication | |
Aman et al. | Position paper: Physical unclonable functions for iot security | |
Delvaux et al. | Secure lightweight entity authentication with strong PUFs: Mission impossible? | |
JP5499358B2 (en) | Authentication processing method and apparatus | |
Huang et al. | A PUF-based unified identity verification framework for secure IoT hardware via device authentication | |
Lin et al. | Low-power sub-threshold design of secure physical unclonable functions | |
Ye et al. | RPUF: Physical unclonable function with randomized challenge to resist modeling attack | |
Oren et al. | On the effectiveness of the remanence decay side-channel to clone memory-based PUFs | |
Wachsmann et al. | Physically unclonable functions (PUFs): Applications, models, and future directions | |
US20170364709A1 (en) | Reliability enhancement methods for physically unclonable function bitstring generation | |
KR20180102627A (en) | Privacy-preserving, mutual PUF-based authentication protocols | |
Zerrouki et al. | A survey on silicon PUFs | |
Hemavathy et al. | Arbiter puf—a review of design, composition, and security aspects | |
Mispan et al. | Cost-efficient design for modeling attacks resistant PUFs |