• Publications
  • Influence
A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication
TLDR
We present a lightweight PUF-based authentication approach that is practical in settings where a server authenticates a device, and for use cases where the number of authentications is limited over a device's lifetime. Expand
  • 93
  • 17
  • PDF
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis
TLDR
We provide an in-depth and comprehensive literature overview on helper data algorithms (HDAs) and expose new threats regarding helper data leakage and manipulation. Expand
  • 141
  • 10
  • PDF
Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise
TLDR
We exploit repeatability imperfections of PUF responses as a side channel for model building. Expand
  • 116
  • 9
  • PDF
A Survey on Lightweight Entity Authentication with Strong PUFs
TLDR
This work extends our prior CHES 2014 manuscript “Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?” as follows. Expand
  • 94
  • 9
  • PDF
Fault Injection Modeling Attacks on 65 nm Arbiter and RO Sum PUFs via Environmental Changes
TLDR
We accelerate repeatability attacks by increasing the fraction of unstable CRPs. Expand
  • 98
  • 7
  • PDF
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
TLDR
We derive new considerably tighter bounds for PUF-induced distributions that suffer from, e.g., bias or spatial correlations. Expand
  • 56
  • 7
  • PDF
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible II
TLDR
In this work, we review eight prominent proposals in chronological order: from the original strong PUF proposal to the more complicated converse and slender PUF proposals. Expand
  • 49
  • 6
  • PDF
Security Analysis of PUF-based Key Generation and Entity Authentication ; Veiligheidsanalyse van PUF-gebaseerde sleutelgeneratie en entiteitsauthenticatie
TLDR
No two physical objects are exactly the same, even when manufactured with a nominally identical process. Expand
  • 26
  • 6
  • PDF
A Speed Area Optimized Embedded Co-processor for McEliece Cryptosystem
TLDR
This paper describes the systematic design methods of an embedded co-processor for a post quantum secure McEliece cryptosystem, which is 10 times faster and 3.8 times smaller than the existing design. Expand
  • 24
  • 5
  • PDF
Machine Learning Attacks on PolyPUF, OB-PUF, RPUF, and PUF-FSM
  • J. Delvaux
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • 2017
TLDR
A physically unclonable function (PUF) is a circuit of which the input– output behavior is designed to be sensitive to the random variations of its manufacturing process. Expand
  • 8
  • 4
  • PDF