000 | 03392nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-031-29207-1 | ||
003 | DE-He213 | ||
005 | 20240207153813.0 | ||
007 | cr nn 008mamaa | ||
008 | 230503s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031292071 _9978-3-031-29207-1 |
||
050 | 4 | _aTK5102.9 | |
072 | 7 |
_aTJF _2bicssc |
|
072 | 7 |
_aUYS _2bicssc |
|
072 | 7 |
_aTEC008000 _2bisacsh |
|
072 | 7 |
_aTJF _2thema |
|
072 | 7 |
_aUYS _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aWisiol, Nils. _eauthor. _0(orcid)0000-0003-2606-614X _1https://orcid.org/0000-0003-2606-614X _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aModeling Attack Security of Physical Unclonable Functions based on Arbiter PUFs _h[electronic resource] / _cby Nils Wisiol. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2023. |
|
300 |
_aXI, 118 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aT-Labs Series in Telecommunication Services, _x2192-2829 |
|
500 | _aAcceso multiusuario | ||
505 | 0 | _aIntroduction -- Physical Unclonable Functions -- XOR Arbiter PUFs -- XOR Arbiter PUFs with Input Transformation -- Interpose PUF -- Feed-Forward Arbiter PUF -- Beli PUF -- LP-PUF -- pypuf: Python Software Library for PUF Research -- Conclusion. | |
520 | _aThis book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientific literature. The book explores designs of variants and compositions of the Arbiter PUF, which was introduced as a CMOS-compatible, electrical PUF design, and has received a lot of research attention, albeit being insecure with respect to modeling attacks. After revisiting modeling attacks on the Arbiter PUF and XOR Arbiter PUF, the author demonstrates attacks against the Lightweight Secure XOR Arbiter PUF, Feed-Forward Arbiter PUF, and the Interpose PUF. He then introduces two novel PUF designs, the Beli PUF and the LP-PUF, and analyzes their security against modeling attacks. The book concludes by showing how the LP-PUF is resilient against currently known modeling attacks. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aSignal processing. | |
650 | 0 | _aElectronic circuits. | |
650 | 0 | _aSecurity systems. | |
650 | 1 | 4 | _aSignal, Speech and Image Processing . |
650 | 2 | 4 | _aElectronic Circuits and Systems. |
650 | 2 | 4 | _aSecurity Science and Technology. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031292064 |
776 | 0 | 8 |
_iPrinted edition: _z9783031292088 |
776 | 0 | 8 |
_iPrinted edition: _z9783031292095 |
830 | 0 |
_aT-Labs Series in Telecommunication Services, _x2192-2829 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-29207-1 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cLIBRO_ELEC | ||
999 |
_c263666 _d263665 |