• Publications
  • Influence
FPGA Intrinsic PUFs and Their Use for IP Protection
TLDR
New protocols for the IP protection problem on FPGAs are proposed and the first construction of a PUF intrinsic to current FPGA based on SRAM memory randomness present on current FFPAs is provided. Expand
Extended abstract: The butterfly PUF protecting IP on every FPGA
TLDR
A new PUF structure called the butterfly PUF that can be used on all types of FPGAs is proposed and experimental results showing their identification and key generation capabilities are presented. Expand
Mutual Information Analysis
TLDR
This work builds a distinguisher that uses the value of the Mutual Information between the observed measurements and a hypothetical leakage to rank key guesses and demonstrates that the model and the attack work effectively in an attack scenario against DPA-resistant logic. Expand
RFID-Tags for Anti-counterfeiting
TLDR
It is shown that a PUF based solution for RFID-tags is feasible in the off-line case and the security protocols that are needed for the detection of the authenticity of a product when it is equipped with such a system are presented. Expand
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates
TLDR
This work introduces the concept of a delta-contracting and epsilon-revealing function which executes preprocessing in the biometric authentication scheme and believes that this concept can become a building block of a public infrastructure for biometrics authentication that nonetheless preserves privacy of the participants. Expand
A soft decision helper data algorithm for SRAM PUFs
TLDR
A distribution for the responses of SRAM-based physically unclonable functions (PUFs) is derived and verified and it is shown that soft decision information becomes available without loss in min-entropy of the fuzzy secret. Expand
Read-Proof Hardware from Protective Coatings
TLDR
An implementation of read-proof hardware that is resistant against invasive attacks is developed and experimental evidence is given that an invasive attack on an IC equipped with this coating, reveals only a small amount of information on the key. Expand
Efficient Helper Data Key Extractor on FPGAs
TLDR
This paper presents for the first time efficient implementations of fuzzy extractors on FPGAs where the efficiency is measured in terms of required hardware resources. Expand
Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection
TLDR
New protocols for the IP protection problem on FPGAs based on public-key (PK) cryptography are proposed, the advantages and costs of such an approach are analyzed, and a PUF intrinsic to current FPG as based on SRAM properties is described. Expand
Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs
TLDR
This work proposes the first HDA design using soft-decision information providing an implementation that occupies 44.8% less resources than previous proposals and can be reduced upto 58.4% due to the smaller entropy loss. Expand
...
1
2
3
4
5
...