Skip to Content

537 Results Found

  • Article
  • Open Access
36 Citations
5,987 Views
19 Pages

A Novel Ultra-Compact FPGA PUF: The DD-PUF

  • Riccardo Della Sala,
  • Davide Bellizia and
  • Giuseppe Scotti

In this paper, we present a novel ultra-compact Physical Unclonable Function (PUF) architecture and its FPGA implementation. The proposed Delay Difference PUF (DD-PUF) is the most dense FPGA-compatible PUF ever reported in the literature, allowing th...

  • Feature Paper
  • Article
  • Open Access
9 Citations
4,187 Views
17 Pages

Strong PUF Enrollment with Machine Learning: A Methodical Approach

  • Amir Ali-Pour,
  • David Hely,
  • Vincent Beroulle and
  • Giorgio Di Natale

19 February 2022

Physically Unclonable Functions (PUFs) have become ubiquitous as part of the emerging cryptographic algorithms. Strong PUFs are also predominantly addressed as the suitable variant for lightweight device authentication and strong single-use key gener...

  • Article
  • Open Access
15 Citations
10,729 Views
24 Pages

Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash)

  • Jeff Calhoun,
  • Cyrus Minwalla,
  • Charles Helmich,
  • Fareena Saqib,
  • Wenjie Che and
  • Jim Plusquellic

Electronic money (e-money or e-Cash) is the digital representation of physical banknotes augmented by added use cases of online and remote payments. This paper presents a novel, anonymous e-money transaction protocol, built based on physical unclonab...

  • Review
  • Open Access
22 Citations
11,699 Views
30 Pages

Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic reconfigurability and profound implications for enhancing hardware security...

  • Review
  • Open Access
78 Citations
10,173 Views
13 Pages

The PUF Protein Family: Overview on PUF RNA Targets, Biological Functions, and Post Transcriptional Regulation

  • Ming Wang,
  • Laurent Ogé,
  • Maria-Dolores Perez-Garcia,
  • Latifa Hamama and
  • Soulaiman Sakr

Post-transcriptional regulation of gene expression plays a crucial role in many processes. In cells, it is mediated by diverse RNA-binding proteins. These proteins can influence mRNA stability, translation, and localization. The PUF protein family (P...

  • Article
  • Open Access
22 Citations
7,761 Views
15 Pages

28 May 2019

The environment-dependent feature of physical unclonable functions (PUFs) is capable of sensing environment changes. This paper presents an analysis and categorization of a variety of PUF sensors. Prior works have demonstrated that PUFs can be used a...

  • Article
  • Open Access
1 Citations
3,133 Views
16 Pages

Enhancing the SRAM PUF with an XOR Gate

  • Jack Garrard,
  • Manuel Aguilar Rios and
  • Bertrand Cambou

2 November 2024

This study focuses on designing enhanced Physically Unclonable Functions (PUFs) based on SRAM devices and improving the security of cryptographic systems. Most SRAM PUFs are limited in their number of CRPs, which makes them vulnerable to enrollment a...

  • Article
  • Open Access
15 Citations
3,477 Views
15 Pages

Low-Power Two-Phase Clocking Adiabatic PUF Circuit

  • Câncio Monteiro and
  • Yasuhiro Takahashi

Internet of Things (IoT) has enabled battery-powered devices to transmit sensitive data, while presenting high power consumption and security issues. To address these challenges, adiabatic-based physical unclonable functions (PUFs) offer a promising...

  • Article
  • Open Access
452 Views
16 Pages

19 November 2025

The rapid development of Internet of Things (IoT) devices has raised challenges in hardware security, as these devices often transmit sensitive data. Physically Unclonable Functions (PUFs) provide a promising approach to address such security concern...

  • Article
  • Open Access
9 Citations
3,655 Views
13 Pages

A Reconfigurable SRAM CRP PUF with High Reliability and Randomness

  • Van Khanh Pham,
  • Chi Trung Ngo,
  • Jae-Won Nam and
  • Jong-Phil Hong

This paper presents a novel reconfigurable SRAM CRP PUF that can achieve high reliability and randomness. In conventional reconfigurable SRAM CRP PUFs, imprecise timing control can produce a biased response output, which is typically attributed to mi...

  • Article
  • Open Access
4 Citations
3,047 Views
19 Pages

The Puf-A Protein Is Required for Primordial Germ Cell Development

  • Chi-Fong Ko,
  • Yi-Chieh Chang,
  • Huan-Chieh Cho and
  • John Yu

27 April 2022

Puf-A, a nucleolar Puf domain protein, is required for ribosome biogenesis. A study of Puf-A in zebrafish has shown that Puf-A is highly expressed in primordial germ cells (PGCs) and participates in PGC development. However, it remains unclear how Pu...

  • Article
  • Open Access
7 Citations
2,757 Views
10 Pages

Physical Unclonable Functions (PUFs) are promising security primitives for resource-constrained IoT devices. A critical aspect of PUF security research is to identify all potential security risks. This information about vulnerabilities is beneficial...

  • Article
  • Open Access
34 Citations
5,905 Views
16 Pages

12 March 2021

Traditional authentication techniques, such as cryptographic solutions, are vulnerable to various attacks occurring on session keys and data. Physical unclonable functions (PUFs) such as dynamic random access memory (DRAM)-based PUFs are introduced a...

  • Article
  • Open Access
8 Citations
6,460 Views
20 Pages

Physical Unclonable Functions (PUFs) are primitives that are designed to leverage naturally occurring variations to produce a random bitstring. Current PUF designs are typically implemented in silicon or utilize variations found in commercial off-the...

  • Article
  • Open Access
10 Citations
4,036 Views
17 Pages

24 September 2020

Because the development of the Internet of Things (IoT) requires technology that transfers information between objects without human intervention, the core of IoT security will be secure authentication between devices or between devices and servers....

  • Article
  • Open Access
7 Citations
3,181 Views
12 Pages

A Unified PUF and Crypto Core Exploiting the Metastability in Latches

  • Ronaldo Serrano,
  • Ckristian Duran,
  • Marco Sarmiento,
  • Tuan-Kiet Dang,
  • Trong-Thuc Hoang and
  • Cong-Kha Pham

17 October 2022

Hardware acceleration of cryptography algorithms represents an emerging approach to obtain benefits in terms of speed and side-channel resistance compared to software implementations. In addition, a hardware implementation can provide the possibility...

  • Article
  • Open Access
518 Views
16 Pages

26 November 2025

Physical Unclonable Functions (PUFs) are hardware-based security primitives that can produce unique digital identifiers from electronic devices. They are particularly useful for Internet of Things (IoT) applications due to their low cost and ability...

  • Article
  • Open Access
7 Citations
4,061 Views
15 Pages

Multibit-Generating Pulsewidth-Based Memristive-PUF Structure and Circuit Implementation

  • Seoyeon Choi,
  • Dayoung Kim,
  • Yunyeong Choi,
  • Wookyung Sun and
  • Hyungsoon Shin

4 September 2020

As Internet of Things (IoT) devices have evolved, physical unclonable functions (PUFs) have become a popular solution for hardware security. In particular, memristor devices are receiving attention as suitable candidates for reliable PUFs because the...

  • Proceeding Paper
  • Open Access
5 Citations
3,258 Views
6 Pages

PUF Modeling Attacks Using Deep Learning and Machine Learning Algorithms

  • Nelakudite Saadvikaa,
  • Kenneth Jonathan Saketi,
  • Akshitha Gopishetti,
  • Bhavitha Degala and
  • Kiran Kumar Anumandla

9 November 2023

The rapid advancement of technology has led to the pervasive presence of electronic devices in our lives, enabling convenience and connectivity. Cryptography offers solutions, but vulnerabilities persist due to physical attacks like malware. This led...

  • Article
  • Open Access
11 Citations
3,310 Views
14 Pages

A Novel RFID Authentication Protocol Based on Reconfigurable RRAM PUF

  • Qirui Ren,
  • Xiangqu Fu,
  • Hao Wu,
  • Kaiqi Yang,
  • Dengyun Lei,
  • Guozhong Xing and
  • Feng Zhang

15 December 2021

Radio frequency identification technology (RFID) has empowered a wide variety of automation industries. Aiming at the current light-weight RFID encryption scheme with limited information protection methods, combined with the physical unclonable funct...

  • Article
  • Open Access
19 Citations
4,535 Views
17 Pages

A Configurable RO-PUF for Securing Embedded Systems Implemented on Programmable Devices

  • Macarena C. Martínez-Rodríguez,
  • Eros Camacho-Ruiz,
  • Piedad Brox and
  • Santiago Sánchez-Solano

14 August 2021

Improving the security of electronic devices that support innovative critical services (digital administrative services, e-health, e-shopping, and on-line banking) is essential to lay the foundations of a secure digital society. Security schemes base...

  • Article
  • Open Access
2 Citations
2,704 Views
18 Pages

Implementation of an Image Tampering Detection System with a CMOS Image Sensor PUF and OP-TEE

  • Tatsuya Oyama,
  • Manami Hagizaki,
  • Shunsuke Okura and
  • Takeshi Fujino

5 November 2024

Since image recognition systems use image data acquired by image sensors for analysis by AI technology, an important security issue is guaranteeing the authenticity of data transmitted from image sensors to successfully perform inference using AI. Th...

  • Article
  • Open Access
26 Citations
4,440 Views
18 Pages

In this work we propose a novel implementation on recent Xilinx FPGA platforms of a PUF architecture based on the NAND SR-latch (referred to as NAND-PUF in the following) which achieves an extremely low resource usage with very good overall performan...

  • Article
  • Open Access
16 Citations
5,862 Views
25 Pages

A PUF- and Biometric-Based Lightweight Hardware Solution to Increase Security at Sensor Nodes

  • Rosario Arjona,
  • Miguel Ángel Prada-Delgado,
  • Javier Arcenegui and
  • Iluminada Baturone

26 July 2018

Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for...

  • Article
  • Open Access
11 Citations
4,658 Views
15 Pages

Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks

  • Fathi Amsaad,
  • Mohammed Niamat,
  • Amer Dawoud and
  • Selcuk Kose

3 September 2018

Silicon Physical Unclonable Functions (sPUFs) are one of the security primitives and state-of-the-art topics in hardware-oriented security and trust research. This paper presents an efficient and dynamic ring oscillator PUFs (d-ROPUFs) technique to i...

  • Article
  • Open Access
10 Citations
3,837 Views
13 Pages

11 December 2021

Low-power and secure crypto-devices are in crucial demand for the current emerging technology of the Internet of Things (IoT). In nanometer CMOS technology, the static and dynamic power consumptions are in a very critical challenge. Therefore, the Fi...

  • Article
  • Open Access
9 Citations
4,618 Views
16 Pages

A Novel SRAM PUF Stability Improvement Method Using Ionization Irradiation

  • Xu Zhang,
  • Chunsheng Jiang,
  • Ke Gu,
  • Le Zhong,
  • Wen Fang and
  • Gang Dai

11 September 2020

As one of the fundamental elements of the fingerprints of integrated circuit chips, static random-access memory based physical unclonable function (SRAM PUF) has been regarded as an attractive option for hardware security circuits. Commercial SRAM ch...

  • Article
  • Open Access
4 Citations
3,178 Views
10 Pages

28 October 2022

This paper introduces a novel and efficient physical unclonable function (PUF) extraction method for SRAM. The proposed one-layer convolution scheme is based on a convolution operation, which significantly enhances the reliability of the PUF. To furt...

  • Article
  • Open Access
1,323 Views
26 Pages

Protecting IoT (Internet of Things) devices against attacks is essential due to the rapid increase in connected devices. This is particularly challenging for lightweight devices with limited hardware capacity, making computationally intensive encrypt...

  • Article
  • Open Access
5 Citations
5,483 Views
14 Pages

Enhancing PUF Based Challenge–Response Sets by Exploiting Various Background Noise Configurations

  • Honorio Martin,
  • Pedro Peris-Lopez,
  • Giorgio Di Natale,
  • Mottaqiallah Taouil and
  • Said Hamdioui

Physically Unclonable Functions (PUFs) are a cryptographic primitive that exploit the unique physical characteristics of Integrated Circuits (ICs). A PUF can be modeled as a black-box challenge–response system. The number and size of challenge&...

  • Article
  • Open Access
16 Citations
7,164 Views
15 Pages

30 June 2014

Secret key leakage in wireless sensor networks (WSNs) is a high security risk especially when sensor nodes are deployed in hostile environment and physically accessible to attackers. With nowadays semi/fully-invasive attack techniques attackers can...

  • Article
  • Open Access
4 Citations
1,956 Views
21 Pages

A Low-Complexity Security Scheme for Drone Communication Based on PUF and LDPC

  • Jiacheng Zhang,
  • Peng Gu,
  • Zhen Wang,
  • Jun Zou and
  • Guangzu Liu

9 September 2024

Due to the limited payload and power of drones, the computational overhead, storage overhead and communication overhead that can be used for secure communication are restricted, making it difficult to apply some complex but fairly secure authenticati...

  • Article
  • Open Access
9 Citations
7,153 Views
13 Pages

15 September 2017

Wireless sensor networks (WSNs) are an emerging technology employed in some crucial applications. However, limited resources and physical exposure to attackers make security a challenging issue for a WSN. Ring oscillator-based physical unclonable fun...

  • Article
  • Open Access
2 Citations
4,260 Views
15 Pages

Genetic and Chemical Controls of Sperm Fate and Spermatocyte Dedifferentiation via PUF-8 and MPK-1 in Caenorhabditis elegans

  • Youngyong Park,
  • Matthew Gaddy,
  • Moonjung Hyun,
  • Mariah E. Jones,
  • Hafiz M. Aslam and
  • Myon Hee Lee

28 January 2023

Using the nematode C. elegans germline as a model system, we previously reported that PUF-8 (a PUF RNA-binding protein) and LIP-1 (a dual-specificity phosphatase) repress sperm fate at 20 °C and the dedifferentiation of spermatocytes into mitotic...

  • Article
  • Open Access
3 Citations
4,033 Views
15 Pages

SRAM-Based PUF Reliability Prediction Using Cell-Imbalance Characterization in the State Space Diagram

  • Gabriel Torrens,
  • Abdel Alheyasat,
  • Bartomeu Alorda and
  • Sebastià A. Bota

This work proposes a methodology to estimate the statistical distribution of the probability that a 6T bit-cell starts up to a given logic value in SRAM memories for PUF applications. First, the distribution is obtained experimentally in a 65-nm CMOS...

  • Article
  • Open Access
12 Citations
4,702 Views
11 Pages

9 August 2022

The Controller Area Network (CAN) is a bus protocol widely used in Electronic control Units (ECUs) to communicate between various subsystems in vehicles. Insecure CAN networks can allow attackers to control information between vital vehicular subsyst...

  • Article
  • Open Access
4 Citations
3,306 Views
15 Pages

Physically unclonable functions (PUFs) are used as low-cost cryptographic primitives in device authentication and secret key creation. SRAM-PUFs are well-known as entropy sources; nevertheless, due of non-deterministic noise environment during the po...

  • Article
  • Open Access
3 Citations
2,629 Views
17 Pages

Runtime Analysis of Area-Efficient Uniform RO-PUF for Uniqueness and Reliability Balancing

  • Zulfikar Zulfikar,
  • Norhayati Soin,
  • Sharifah Fatmadiana Wan Muhamad Hatta and
  • Mohamad Sofian Abu Talip

14 October 2021

The main issue of ring oscillator physical unclonable functions (RO-PUF) is the existence of unstable ROs in response to environmental variations. The RO pairs with close frequency differences tend to contribute bit flips, reducing the reliability. R...

  • Article
  • Open Access
25 Citations
3,780 Views
18 Pages

A Lightweight and Practical Anonymous Authentication Protocol Based on Bit-Self-Test PUF

  • Yang An,
  • Yuejiao Zhang,
  • Wenjun Cao,
  • Zhiyan Tong and
  • Zhangqing He

Physical unclonable function (PUF), a cryptographic primitive, has recently been used in protocol design because it can ensure a tamper-evident feature. In many PUF-based protocol schemes, helper data algorithms (HDA) or fuzzy extractors (FE) are use...

  • Article
  • Open Access
8 Citations
3,568 Views
28 Pages

STT-DPSA: Digital PUF-Based Secure Authentication Using STT-MRAM for the Internet of Things

  • Wei-Chen Chien,
  • Yu-Chian Chang,
  • Yao-Tung Tsou,
  • Sy-Yen Kuo and
  • Ching-Ray Chang

Physical unclonable function (PUF), a hardware-efficient approach, has drawn a lot of attention in the security research community for exploiting the inevitable manufacturing variability of integrated circuits (IC) as the unique fingerprint of each I...

  • Article
  • Open Access
7 Citations
1,660 Views
15 Pages

21 June 2024

A secure and effective authentication and communication scheme between users and underwater sensors plays an important role in improving the detection and utilization of marine resources in underwater acoustic networks (UANs). However, due to the ene...

  • Article
  • Open Access
2,355 Views
27 Pages

Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture

  • Jingqi Zhang,
  • Zhiming Chen,
  • Xiang He,
  • Kuanhao Liu,
  • Yue Hao,
  • Mingzhi Ma,
  • Weijiang Wang,
  • Hua Dang and
  • Xiangnan Li

21 April 2024

Physically unclonable functions (PUFs) are crucial for enhancing cybersecurity by providing unique, intrinsic identifiers for electronic devices, thus ensuring their authenticity and preventing unauthorized cloning. The SRAM-PUF, characterized by its...

  • Article
  • Open Access
2 Citations
2,669 Views
15 Pages

Hash and Physical Unclonable Function (PUF)-Based Mutual Authentication Mechanism

  • Kavita Bhatia,
  • Santosh K. Pandey,
  • Vivek K. Singh and
  • Deena Nath Gupta

11 July 2023

The security of web applications in an enterprise is of paramount importance. To strengthen the security of applications, the identification and mitigation of vulnerabilities through appropriate countermeasures becomes imperative. The Open Web Applic...

  • Article
  • Open Access
11 Citations
3,844 Views
19 Pages

30 December 2023

In recent times, the advent of innovative technological paradigms like the Internet of Things has paved the way for numerous applications that enhance the quality of human life. A remarkable application of IoT that has emerged is the Internet of Vehi...

  • Article
  • Open Access
475 Views
29 Pages

29 December 2025

The rapid convergence of artificial intelligence (AI), cloud computing, and 5G communication has positioned extended reality (XR) as a core technology bridging the physical and virtual worlds. Encompassing virtual reality (VR), augmented reality (AR)...

  • Article
  • Open Access
11 Citations
4,016 Views
18 Pages

PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS

  • Mubarak Mehdi,
  • Muhammad Taha Ajani,
  • Hasan Tahir,
  • Shahzaib Tahir,
  • Zahoor Alizai,
  • Fawad Khan,
  • Qaiser Riaz and
  • Mehdi Hussain

Consumer electronics manufacturers have been incorporating support for 4G/5G communication technologies into many electronic devices. Thus, highly capable Internet of Things (IoT)-ready versions of electronic devices are being purchased which will ev...

  • Article
  • Open Access
15 Citations
3,550 Views
26 Pages

6 February 2025

The Internet of Drones (IoD) is an emerging industry that offers convenient services for humans due to the high mobility and flexibility of drones. The IoD substantially enhances human life by enabling diverse drone applications across various domain...

  • Article
  • Open Access
10 Citations
2,712 Views
23 Pages

27 November 2022

Machine-to-machine (M2M) communication is one of the critical technologies of the industrial Internet of Things (IoT), which consists of sensors, actuators at the edge, and servers. In order to solve the security and availability problems regarding c...

  • Article
  • Open Access
4 Citations
2,071 Views
20 Pages

A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders

  • Jing Liu,
  • Jianguo Xie,
  • Junwei Zhang,
  • Biao Liu,
  • Xiaoming Chen and
  • Huamin Feng

12 May 2023

Modern cryptography attributes the security of a cryptographic system to the security of the key. How to securely distribute the key has always been a bottleneck in key management. This paper proposes a secure group key agreement scheme for multiple...

  • Article
  • Open Access
7 Citations
4,399 Views
20 Pages

26 July 2022

Cybersecurity is a challenge in the utilization of IoT devices. One of the main security functions that we need for IoT devices is authentication. In this work, we used physical unclonable function (PUF) technology to propose a lightweight authentica...

of 11