[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Pehl et al., 2016 - Google Patents

Efficient evaluation of physical unclonable functions using entropy measures

Pehl et al., 2016

Document ID
2218556747520533088
Author
Pehl M
Hiller M
Graeb H
Publication year
Publication venue
Journal of Circuits, Systems and Computers

External Links

Snippet

Physical unclonable functions (PUFs) are security primitives which are based on uncontrollable variations in the manufacturing process and can be used as secure key storage and for identification and authentication. While some work has been done on global …
Continue reading at www.worldscientific.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/3183Generation of test inputs, e.g. test vectors, patterns or sequence
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6261Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation partitioning the feature space
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image

Similar Documents

Publication Publication Date Title
Li et al. Provably secure camouflaging strategy for IC protection
CN107276761B (en) Apparatus and method for testing physical unclonable function
Maiti et al. A robust physical unclonable function with enhanced challenge-response set
US10397251B2 (en) System and method for securing an electronic circuit
Liu et al. Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting
JP6608457B2 (en) A method for generating physically unclonable function bitstreams with improved reliability
US8370787B2 (en) Testing security of mapping functions
Alkabani et al. Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
US8880954B2 (en) Temperature-profiled device fingerprint generation and authentication from power-up states of static cells
O’donnell et al. PUF-based random number generation
CN105046170A (en) Derivation of a Device-Specific Value
Bhattacharya et al. Estimating component characteristics from system failure‐time data
Wei et al. Self-consistency and consistency-based detection and diagnosis of malicious circuitry
Andrikos et al. Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
Pehl et al. Advanced performance metrics for physical unclonable functions
Ngo et al. Side-channel analysis of the random number generator in STM32 MCUs
Delvaux et al. Upper bounds on the min-entropy of RO sum, arbiter, feed-forward arbiter, and S-ArbRO PUFs
Pehl et al. Efficient evaluation of physical unclonable functions using entropy measures
Liu et al. A novel security key generation method for SRAM PUF based on Fourier analysis
Perkowski et al. Test generation and fault localization for quantum circuits
Saqib et al. ASIC implementation of a hardware‐embedded physical unclonable function
KR20170092601A (en) Systems and methods for generating random numbers using physical variations present in material samples
Zhang et al. Hardware Trojan detection with linear regression based gate-level characterization
Saha et al. Embedding of signatures in reconfigurable scan architecture for authentication of intellectual properties in system‐on‐chip
Surabhi et al. Golden-free robust age estimation to triage recycled ics