Design and implementation of high-quality physical unclonable functions for hardware-oriented cryptography

16Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Physical Unclonable Functions have emerged as effective primitives for varieties of security applications. With the advent of mobile computing, designing and implementing high-quality PUFs for resource-constrained platforms become a great challenge. This chapter presents an extensive review of the techniques proposed in the recent years for the design and implementation of high-quality and/or alternative PUF instances with marginal overhead. With a preamble of the motivations, fundamentals, quality metrics and application scenarios of PUF, some existing approaches to improving the quality of PUFs are unfolded. Subsequently, some representative PUF designs for RFIDs and fingerprint extractions are illustrated. In addition, applications for true random number generation based on PUF instances are delineated. Finally, two emerging types of PUF implementations that can be used for more advanced protocols are presented. The practices summarized in this chapter aim to help the engineers and researchers in the hardware security community to design and implement PUFs that suit their applications and constraints.

Cite

CITATION STYLE

APA

Zalivaka, S. S., Zhang, L., Klybik, V. P., Ivaniuk, A. A., & Chang, C. H. (2015). Design and implementation of high-quality physical unclonable functions for hardware-oriented cryptography. In Secure System Design and Trustable Computing (pp. 39–81). Springer International Publishing. https://doi.org/10.1007/978-3-319-14971-4_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free