Combining Optimization Objectives: New Modeling Attacks on Strong PUFs
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a lightweight alternative to classical cryptography for purposes such as device authentication. Most of the proposed candidates, however, have been plagued by modeling attacks breaking their security...
Main Authors: | Johannes Tobisch, Anita Aghaie, Georg T. Becker |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2021-02-01
|
Series: | Transactions on Cryptographic Hardware and Embedded Systems |
Subjects: | |
Online Access: | https://tches.iacr.org/index.php/TCHES/article/view/8798 |
Similar Items
-
Inconsistency of Simulation and Practice in Delay-based Strong PUFs
by: Anita Aghaie, et al.
Published: (2021-07-01) -
Splitting the Interpose PUF: A Novel Modeling Attack Strategy
by: Nils Wisiol, et al.
Published: (2020-06-01) -
Highly secure strong PUF based on nonlinearity of MOSFET subthreshold operation
by: Kalyanaraman, Mukund Murali
Published: (2013) -
Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks
by: Fathi Amsaad, et al.
Published: (2018-09-01) -
Design of a Hardware Security PUF Immune to Machine Learning Attacks
by: Pundir, Nitin K., Pundir
Published: (2017)