版权说明 操作指南
首页 > 成果 > 详情

Design and Evaluate Recomposited OR-AND-XOR-PUF

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文
作者:
Yao, Jianrong;Pang, Lihui;Su, Yang;Zhang, Zhi;Yang, Wei;...
通讯作者:
Gao, Y.
作者机构:
[Gao, Yansong; Fu, Anmin; Yao, Jianrong; Yang, Wei] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Jiangsu, Peoples R China.
[Pang, Lihui] Univ South China, Sch Elect Engn, Hengyang 421009, Hunan, Peoples R China.
[Pang, Lihui] Sungkyunkwan Univ, Secur Engn Lab, Seoul 16419, South Korea.
[Su, Yang] Univ Adelaide, Sch Comp Sci, Adelaide, SA 5005, Australia.
[Zhang, Zhi] CSIRO, Data61, Sydney, NSW 2052, Australia.
通讯机构:
[Gao, Y.] N
Nanjing University of Science and Technology, School of Computer Science and Engineering, Jiangsu, Nanjing, China
语种:
英文
关键词:
modeling attacks;OR-AND-XOR-PUF;Recomposited PUF;XOR-PUF
期刊:
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING
ISSN:
2168-6750
年:
2022
卷:
10
期:
2
页码:
662-677
基金类别:
This work was supported in part by the National Natural Science Foundation of China under Grants 62002167 and 61901209, and in part by the National Natural Science Foundation of JiangSu under Grant BK20200461.
机构署名:
本校为其他机构
院系归属:
电气工程学院
摘要:
Physical Unclonable Function (PUF) is a hardware security primitive with a desirable feature of low cost. Considering the space of challenge-response pairs (CRPs), there are two PUF categories: weak PUF and strong PUF. Compared to a weak PUF, a strong PUF has a wider range of applications. However, it is challenging to design a reliable and secure lightweight strong PUF. To address this challenge, PUF recomposition built upon multiple simple PUF instances has received a lot of attention in research, such as the most popular XOR-APUF, the recent...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com