Abstract
This paper describes the use of physical unclonable functions (PUFs) in low-cost authentication and key generation applications. First, it motivates the use of PUFs versus conventional secure nonvolatile memories and defines the two primary PUF types: 'strong PUFs' and 'weak PUFs.' It describes strong PUF implementations and their use for low-cost authentication. After this description, the paper covers both attacks and protocols to address errors. Next, the paper covers weak PUF implementations and their use in key generation applications. It covers error-correction schemes such as pattern matching and index-based coding. Finally, this paper reviews several emerging concepts in PUF technologies such as public model PUFs and new PUF implementation technologies. © 1963-2012 IEEE.
Author supplied keywords
Cite
CITATION STYLE
Herder, C., Yu, M. D., Koushanfar, F., & Devadas, S. (2014). Physical unclonable functions and applications: A tutorial. Proceedings of the IEEE. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/JPROC.2014.2320516
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.