[go: up one dir, main page]

Durai et al., 2017 - Google Patents

Real Time Implementation of QFT-PUF Architecture for Data Secure System-on-Chip

Durai et al., 2017

Document ID
7275546553874349049
Author
Durai S
Parthasarathy R
Publication year
Publication venue
Journal of Computational and Theoretical Nanoscience

External Links

Snippet

System-on-chip (SoC) face major problem due to vulnerability of hack. The hacker target the cryptographic IP block in the architecture of SoC. However, PUF test wrapper provides the security for individual IP core. The individual IP core protection plays major problem in PUF …
Continue reading at www.ingentaconnect.com (other versions)

Similar Documents

Publication Publication Date Title
Zalivaka et al. Reliable and modeling attack resistant authentication of arbiter PUF in FPGA implementation with trinary quadruple response
US10742421B1 (en) Methods and systems for anonymous hardware attestation
US11831777B2 (en) Secure computing hardware apparatus
US10735205B1 (en) Methods and systems for implementing an anonymized attestation chain
Gao et al. PUF-FSM: a controlled strong PUF
Gu et al. A modeling attack resistant deception technique for securing lightweight-PUF-based authentication
Johnson et al. A PUF-enabled secure architecture for FPGA-based IoT applications
Yu et al. A lockdown technique to prevent machine learning on PUFs for lightweight authentication
RU2619895C1 (en) Data encryption system and methods
Herder et al. Physical unclonable functions and applications: A tutorial
US9628272B2 (en) PUF authentication and key-exchange by substring matching
CN106664204B (en) Differential power analysis strategy
EP3542261B1 (en) Method for performing a trustworthiness test on a random number generator
US20060221686A1 (en) Integrated circuit that uses a dynamic characteristic of the circuit
US11593488B2 (en) Systems and methods for a cryptographic agile bootloader for upgradable secure environment
Zalivaka et al. Design and implementation of high-quality physical unclonable functions for hardware-oriented cryptography
Wortman et al. P2M‐based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices
Sami et al. Poca: First power-on chip authentication in untrusted foundry and assembly
Ruhrmair Sok: Towards secret-free security
van Dijk et al. Protocol attacks on advanced PUF protocols and countermeasures
CN113597627B (en) Dynamic transformations in blockchain header validation
Yu et al. Why deep learning makes it difficult to keep secrets in FPGAs
Gebotys et al. Security wrappers and power analysis for SoC technologies
Chhabra et al. Hardware obfuscation of aes ip core using pufs and prng: A secure cryptographic key generation solution for internet-of-things applications
Mühlbach et al. Secure communication in microcomputer bus systems for embedded devices