語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Modeling attack security of physical...
~
Wisiol, Nils.
FindBook
Google Book
Amazon
博客來
Modeling attack security of physical unclonable functions based on Arbiter PUFs
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Modeling attack security of physical unclonable functions based on Arbiter PUFs/ by Nils Wisiol.
作者:
Wisiol, Nils.
出版者:
Cham :Springer International Publishing : : 2023.,
面頁冊數:
xi, 118 p. :ill., digital ;24 cm.
內容註:
Introduction -- Physical Unclonable Functions -- XOR Arbiter PUFs -- XOR Arbiter PUFs with Input Transformation -- Interpose PUF -- Feed-Forward Arbiter PUF -- Beli PUF -- LP-PUF -- pypuf: Python Software Library for PUF Research -- Conclusion.
Contained By:
Springer Nature eBook
標題:
Telecommunication - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-031-29207-1
ISBN:
9783031292071
Modeling attack security of physical unclonable functions based on Arbiter PUFs
Wisiol, Nils.
Modeling attack security of physical unclonable functions based on Arbiter PUFs
[electronic resource] /by Nils Wisiol. - Cham :Springer International Publishing :2023. - xi, 118 p. :ill., digital ;24 cm. - T-labs series in telecommunication services,2192-2829. - T-labs series in telecommunication services..
Introduction -- Physical Unclonable Functions -- XOR Arbiter PUFs -- XOR Arbiter PUFs with Input Transformation -- Interpose PUF -- Feed-Forward Arbiter PUF -- Beli PUF -- LP-PUF -- pypuf: Python Software Library for PUF Research -- Conclusion.
This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientific literature. The book explores designs of variants and compositions of the Arbiter PUF, which was introduced as a CMOS-compatible, electrical PUF design, and has received a lot of research attention, albeit being insecure with respect to modeling attacks. After revisiting modeling attacks on the Arbiter PUF and XOR Arbiter PUF, the author demonstrates attacks against the Lightweight Secure XOR Arbiter PUF, Feed-Forward Arbiter PUF, and the Interpose PUF. He then introduces two novel PUF designs, the Beli PUF and the LP-PUF, and analyzes their security against modeling attacks. The book concludes by showing how the LP-PUF is resilient against currently known modeling attacks.
ISBN: 9783031292071
Standard No.: 10.1007/978-3-031-29207-1doiSubjects--Topical Terms:
540556
Telecommunication
--Security measures.
LC Class. No.: TK5102.85
Dewey Class. No.: 005.8
Modeling attack security of physical unclonable functions based on Arbiter PUFs
LDR
:02331nmm a2200361 a 4500
001
2317558
003
DE-He213
005
20230503123612.0
006
m d
007
cr nn 008maaau
008
230902s2023 sz s 0 eng d
020
$a
9783031292071
$q
(electronic bk.)
020
$a
9783031292064
$q
(paper)
024
7
$a
10.1007/978-3-031-29207-1
$2
doi
035
$a
978-3-031-29207-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5102.85
072
7
$a
TJF
$2
bicssc
072
7
$a
UYS
$2
bicssc
072
7
$a
TEC008000
$2
bisacsh
072
7
$a
TJF
$2
thema
072
7
$a
UYS
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5102.85
$b
.W814 2023
100
1
$a
Wisiol, Nils.
$3
3631758
245
1 0
$a
Modeling attack security of physical unclonable functions based on Arbiter PUFs
$h
[electronic resource] /
$c
by Nils Wisiol.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2023.
300
$a
xi, 118 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
T-labs series in telecommunication services,
$x
2192-2829
505
0
$a
Introduction -- Physical Unclonable Functions -- XOR Arbiter PUFs -- XOR Arbiter PUFs with Input Transformation -- Interpose PUF -- Feed-Forward Arbiter PUF -- Beli PUF -- LP-PUF -- pypuf: Python Software Library for PUF Research -- Conclusion.
520
$a
This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientific literature. The book explores designs of variants and compositions of the Arbiter PUF, which was introduced as a CMOS-compatible, electrical PUF design, and has received a lot of research attention, albeit being insecure with respect to modeling attacks. After revisiting modeling attacks on the Arbiter PUF and XOR Arbiter PUF, the author demonstrates attacks against the Lightweight Secure XOR Arbiter PUF, Feed-Forward Arbiter PUF, and the Interpose PUF. He then introduces two novel PUF designs, the Beli PUF and the LP-PUF, and analyzes their security against modeling attacks. The book concludes by showing how the LP-PUF is resilient against currently known modeling attacks.
650
0
$a
Telecommunication
$x
Security measures.
$3
540556
650
1 4
$a
Signal, Speech and Image Processing.
$3
3592727
650
2 4
$a
Electronic Circuits and Systems.
$3
3538814
650
2 4
$a
Security Science and Technology.
$3
1531662
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
T-labs series in telecommunication services.
$3
2056823
856
4 0
$u
https://doi.org/10.1007/978-3-031-29207-1
950
$a
Engineering (SpringerNature-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9453808
電子資源
11.線上閱覽_V
電子書
EB TK5102.85
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入