Essays about: "PUF"

Showing result 1 - 5 of 9 essays containing the word PUF.

  1. 1. PUF-enabled blockchain for IoT security : A comparative study

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Jonathon Bisiach; Victor Elfving; [2021]
    Keywords : Internet of Things; Internet of Everything; Blockchain; Physical Unclonable Functions; Consensus Algorithms; Proof of Work; Proof of Authentication; Proof of PUF-enabled Authentication;

    Abstract : The introduction of Physical Unclonable Functions (PUFs) and lightweight consensus algorithms to aid in the bolstering of security and privacy in both IoT and IoE does show a great deal of promise not only in these areas, but in resource cost over traditional methods of blockchain.  However, several previous studies make claims regarding performance of novel solutions without providing detailed information as to the physical components of their experiments. READ MORE

  2. 2. Designing a Physical Unclonable Function for Cryptographic Hardware

    University essay from Linköpings universitet/Institutionen för teknik och naturvetenskap; Linköpings universitet/Tekniska fakulteten

    Author : Ludwig Bergfalck; Johannes Engström; [2021]
    Keywords : Hardware-based keyseed; Tamper protection; Physical Unclonable Function PUF ; Sensing mesh enclosure; Differential capacitance measurements;

    Abstract : Hardware Security Modules (HSMs) are embedded systems that provide a physically secure data storage and handling environment. This master thesis evaluates an HSM method incorporating cryptographic key generation, key management, and tamper protection. READ MORE

  3. 3. An FPGA Implementation of Arbiter PUF with 4x4 Switch Blocks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Can Aknesil; [2020]
    Keywords : ;

    Abstract : Theft of services, private information, and intellectual property have become significant dangers to the general public and industry. Cryptographic algorithms are used for protection against these dangers. All cryptographic algorithms rely on secret keys that should be generated by an unpredictable process and securely stored. READ MORE

  4. 4. Method development for the analysis of PFAS and neutral precursors in active and passive air samplers

    University essay from Örebro universitet/Institutionen för naturvetenskap och teknik

    Author : Pascal Camoiras González; [2019]
    Keywords : ;

    Abstract : Poly- and perfluoroalkyl substances (PFAS) are a chemical class of global concern because of their persistence, toxicity and widespread presence in the environment. This work aimed to develop a robust and reliable method to analyse perfluorohexane sulfonic acid (PFHxS), perfluorooctanoic acid (PFOA) and perfluorooctane sulfonic acid (PFOS), as well as the neutral volatile PFOS precursors, namely perfluorooctane sulfonamides and perfluorooctane sulfonamidoethanols (FOSAs/FOSEs). READ MORE

  5. 5. Lightweight and Machine Learning Attack Resistant Physical Unclonable Functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oskar Näslund; [2019]
    Keywords : ;

    Abstract : More and more embedded devices such as smart home appliances are being connected to the Internet. Implementing lightweight security at a low cost thus becomes increasingly relevant to prevent malicious network entries using less protected devices. READ MORE