News

SRAM-based PUF Authentication and Integrity ... the implementation of the data remanence algorithm. We selected the cells that flipped their value in the shortest time (300ms). We consider that the ...
Abstract: Physical unclonable function (PUF ... authentication protocol, where no response is exposed to the adversary. Protocol B can be classified as the lightweight protocol because it can avoid ...
“It is a secure I2C co-processor with built-in 1-Wire master that combines FIPS202-compliant secure hash algorithm [SHA-3] challenge and ... brand for its ‘physically uncloneable function’ (PUF) – ...