Essays about: "Arbiter PUF"

Found 4 essays containing the words Arbiter PUF.

  1. 1. An FPGA Implementation of Arbiter PUF with 4x4 Switch Blocks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Can Aknesil; [2020]
    Keywords : ;

    Abstract : Theft of services, private information, and intellectual property have become significant dangers to the general public and industry. Cryptographic algorithms are used for protection against these dangers. All cryptographic algorithms rely on secret keys that should be generated by an unpredictable process and securely stored. READ MORE

  2. 2. Lightweight and Machine Learning Attack Resistant Physical Unclonable Functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oskar Näslund; [2019]
    Keywords : ;

    Abstract : More and more embedded devices such as smart home appliances are being connected to the Internet. Implementing lightweight security at a low cost thus becomes increasingly relevant to prevent malicious network entries using less protected devices. READ MORE

  3. 3. Characterization of FPGA-based Arbiter Physical Unclonable Functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jingnan Shao; [2019]
    Keywords : Arbiter PUF; FPGA; Altera; Verilog HDL; Arbiter PUF; FPGA; Altera; Verilog HDL;

    Abstract : The security of service, confidential data, and intellectual property are threatened by physical attacks, which usually include reading and tampering the data. In many cases, attackers can have access to the tools and equipment that can be used to read the memory or corrupt it, either by invasive or non-invasive means. READ MORE

  4. 4. On Statistical Properties of Arbiter Physical Unclonable Functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Phillip Gajland; [2018]
    Keywords : PUF; Boolean function; function distribution; arbiter path; digital fingerprint; secure key storage; cryptography; system security; hardware security.;

    Abstract : The growing interest in the Internet of Things (IoT) has led to predictions claiming that by 2020 we can expect to be surrounded by 50 billion Internet connected devices. With more entry points to a network, adversaries can potentially use IoT devices as a stepping stone for attacking other devices connected to the network or the network itself. READ MORE