The aim of this chapter is to provide an information-theoretic framework for the analysis of physical unclonable function (PUF) security. We set up this framework and then apply it to optical PUFs and coating PUFs. From the description of PUFs in Chapter 1 some obvious questions arise in the context of the security primitives discussed in Part I. © 2007 Springer-Verlag London.
CITATION STYLE
Tuyls, P., & Skoric, B. (2007). On the amount of entropy in PUFs. In Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (pp. 195–215). Springer London. https://doi.org/10.1007/978-1-84628-984-2_12
Mendeley helps you to discover research relevant for your work.