Physical unclonable functions and applications: A tutorial

1.2kCitations
Citations of this article
503Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper describes the use of physical unclonable functions (PUFs) in low-cost authentication and key generation applications. First, it motivates the use of PUFs versus conventional secure nonvolatile memories and defines the two primary PUF types: 'strong PUFs' and 'weak PUFs.' It describes strong PUF implementations and their use for low-cost authentication. After this description, the paper covers both attacks and protocols to address errors. Next, the paper covers weak PUF implementations and their use in key generation applications. It covers error-correction schemes such as pattern matching and index-based coding. Finally, this paper reviews several emerging concepts in PUF technologies such as public model PUFs and new PUF implementation technologies. © 1963-2012 IEEE.

Cite

CITATION STYLE

APA

Herder, C., Yu, M. D., Koushanfar, F., & Devadas, S. (2014). Physical unclonable functions and applications: A tutorial. Proceedings of the IEEE. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/JPROC.2014.2320516

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free