A Generation and Recovery Framework for Silicon PUFs Based Cryptographic Key

[1]  Yevgeniy Dodis,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.

[2]  Hermann Kampermann,et al.  Theoretical framework for physical unclonable functions, including quantum readout , 2020 .

[3]  Yohei Hori,et al.  Performance Analysis for PUF Data Using Fuzzy Extractor , 2014 .

[4]  Stéphane Cauchie,et al.  Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability , 2018, AsiaCCS.

[5]  Hafida Bouarfa,et al.  Towards an Automatic Evaluation of the Performance of Physical Unclonable Functions , 2021 .

[6]  Matthias Hiller,et al.  Review of error correction for PUFs and evaluation on state-of-the-art FPGAs , 2020, Journal of Cryptographic Engineering.

[7]  Shuai Han,et al.  Reusable fuzzy extractor from the decisional Diffie–Hellman assumption , 2018, Des. Codes Cryptogr..

[8]  Samir Ouchani,et al.  Ensuring the Functional Correctness of IoT through Formal Modeling and Verification , 2018, MEDI.

[9]  Bart Preneel,et al.  Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment , 2012, CHES.

[10]  Quan Wang,et al.  A PUF-based unified identity verification framework for secure IoT hardware via device authentication , 2019, World Wide Web.

[11]  Ingrid Verbauwhede,et al.  PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator , 2012, CHES.

[12]  Dawu Gu,et al.  Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications , 2016, CHES.

[13]  Dawu Gu,et al.  Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[14]  Hafida Bouarfa,et al.  A Low-Cost Authentication Protocol Using Arbiter-PUF , 2021, MEDI.

[15]  Bo Zhao,et al.  ePUF: A lightweight double identity verification in IoT , 2020, Tsinghua Science and Technology.