Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Modeling attack security of physical...
~
Wisiol, Nils.
Linked to FindBook
Google Book
Amazon
博客來
Modeling attack security of physical unclonable functions based on Arbiter PUFs
Record Type:
Electronic resources : Monograph/item
Title/Author:
Modeling attack security of physical unclonable functions based on Arbiter PUFs/ by Nils Wisiol.
Author:
Wisiol, Nils.
Published:
Cham :Springer International Publishing : : 2023.,
Description:
xi, 118 p. :ill., digital ;24 cm.
[NT 15003449]:
Introduction -- Physical Unclonable Functions -- XOR Arbiter PUFs -- XOR Arbiter PUFs with Input Transformation -- Interpose PUF -- Feed-Forward Arbiter PUF -- Beli PUF -- LP-PUF -- pypuf: Python Software Library for PUF Research -- Conclusion.
Contained By:
Springer Nature eBook
Subject:
Telecommunication - Security measures. -
Online resource:
https://doi.org/10.1007/978-3-031-29207-1
ISBN:
9783031292071
Modeling attack security of physical unclonable functions based on Arbiter PUFs
Wisiol, Nils.
Modeling attack security of physical unclonable functions based on Arbiter PUFs
[electronic resource] /by Nils Wisiol. - Cham :Springer International Publishing :2023. - xi, 118 p. :ill., digital ;24 cm. - T-labs series in telecommunication services,2192-2829. - T-labs series in telecommunication services..
Introduction -- Physical Unclonable Functions -- XOR Arbiter PUFs -- XOR Arbiter PUFs with Input Transformation -- Interpose PUF -- Feed-Forward Arbiter PUF -- Beli PUF -- LP-PUF -- pypuf: Python Software Library for PUF Research -- Conclusion.
This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientific literature. The book explores designs of variants and compositions of the Arbiter PUF, which was introduced as a CMOS-compatible, electrical PUF design, and has received a lot of research attention, albeit being insecure with respect to modeling attacks. After revisiting modeling attacks on the Arbiter PUF and XOR Arbiter PUF, the author demonstrates attacks against the Lightweight Secure XOR Arbiter PUF, Feed-Forward Arbiter PUF, and the Interpose PUF. He then introduces two novel PUF designs, the Beli PUF and the LP-PUF, and analyzes their security against modeling attacks. The book concludes by showing how the LP-PUF is resilient against currently known modeling attacks.
ISBN: 9783031292071
Standard No.: 10.1007/978-3-031-29207-1doiSubjects--Topical Terms:
540556
Telecommunication
--Security measures.
LC Class. No.: TK5102.85
Dewey Class. No.: 005.8
Modeling attack security of physical unclonable functions based on Arbiter PUFs
LDR
:02331nmm a2200361 a 4500
001
2317558
003
DE-He213
005
20230503123612.0
006
m d
007
cr nn 008maaau
008
230902s2023 sz s 0 eng d
020
$a
9783031292071
$q
(electronic bk.)
020
$a
9783031292064
$q
(paper)
024
7
$a
10.1007/978-3-031-29207-1
$2
doi
035
$a
978-3-031-29207-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5102.85
072
7
$a
TJF
$2
bicssc
072
7
$a
UYS
$2
bicssc
072
7
$a
TEC008000
$2
bisacsh
072
7
$a
TJF
$2
thema
072
7
$a
UYS
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5102.85
$b
.W814 2023
100
1
$a
Wisiol, Nils.
$3
3631758
245
1 0
$a
Modeling attack security of physical unclonable functions based on Arbiter PUFs
$h
[electronic resource] /
$c
by Nils Wisiol.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2023.
300
$a
xi, 118 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
T-labs series in telecommunication services,
$x
2192-2829
505
0
$a
Introduction -- Physical Unclonable Functions -- XOR Arbiter PUFs -- XOR Arbiter PUFs with Input Transformation -- Interpose PUF -- Feed-Forward Arbiter PUF -- Beli PUF -- LP-PUF -- pypuf: Python Software Library for PUF Research -- Conclusion.
520
$a
This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientific literature. The book explores designs of variants and compositions of the Arbiter PUF, which was introduced as a CMOS-compatible, electrical PUF design, and has received a lot of research attention, albeit being insecure with respect to modeling attacks. After revisiting modeling attacks on the Arbiter PUF and XOR Arbiter PUF, the author demonstrates attacks against the Lightweight Secure XOR Arbiter PUF, Feed-Forward Arbiter PUF, and the Interpose PUF. He then introduces two novel PUF designs, the Beli PUF and the LP-PUF, and analyzes their security against modeling attacks. The book concludes by showing how the LP-PUF is resilient against currently known modeling attacks.
650
0
$a
Telecommunication
$x
Security measures.
$3
540556
650
1 4
$a
Signal, Speech and Image Processing.
$3
3592727
650
2 4
$a
Electronic Circuits and Systems.
$3
3538814
650
2 4
$a
Security Science and Technology.
$3
1531662
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
T-labs series in telecommunication services.
$3
2056823
856
4 0
$u
https://doi.org/10.1007/978-3-031-29207-1
950
$a
Engineering (SpringerNature-11647)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9453808
電子資源
11.線上閱覽_V
電子書
EB TK5102.85
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login