Strong Authentication with Physical Unclonable Functions

  • Tuyls P
  • Škorić B
N/ACitations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Physical unclonable functions (PUFs) can be used as a cost-effectivemeans to store cryptographic key material in an unclonable way. Theycan be employed for strong authentication of objects, e.g., tokens,and of persons possessing such tokens, but also for other purposes.We give a short overview of security applications where PUFs areuseful, and discuss physical realisations, noisy measurements andinformation content of PUFs. Then we describe an integrated authenticationtoken containing an optical PUF, a challenging mechanism and a detector.Finally, we discuss authentication protocols for controlled and uncontrolledPUFs.

Cite

CITATION STYLE

APA

Tuyls, P., & Škorić, B. (2007). Strong Authentication with Physical Unclonable Functions. In Security, Privacy, and Trust in Modern Data Management (pp. 133–148). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-69861-6_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free