SCIENCE CHINA Information Sciences, Volume 59 , Issue 1 : 012108(2016) https://doi.org/10.1007/s11432-015-5287-9

A dynamic PUF anti-aging authentication system based on restrict race code

More info
  • ReceivedOct 10, 2014
  • AcceptedDec 9, 2014
  • PublishedApr 30, 2015


There is no abstract available for this article.


[1] Lim D, Lee J W, Gassend B, et al. IEEE Trans VLSI Syst, 2005, 13: 1200-1205 CrossRef Google Scholar

[2] Lee J W, Lim D, Gassend B, et al. A technique to build a secret key in integrated circuits for identification and authentication application. In: Proceedings of the Symposium on VLSI Circuits, Honolulu, 2004. 176--159. Google Scholar

[3] Yin C E D, Gang Q. Maximizing RO PUF's secret extraction. In: Proceedings of IEEE Symposium on Hardware-Oriented Security and Trust, Anaheim, 2010. 100--105. Google Scholar

[4] Holcomb D E, Burleson W P, Fu K, et al. IEEE Trans Comput, 2007, 58: 11-13 Google Scholar

[5] Su Y, Holleman J, Otis B. A 1.6pj/bit 96\ In: Proceedings of IEEE International Solid-State Circuits Conference, San Francisco, 2007. 406--611. Google Scholar

[6] van der Leest V, Schrijen G J, Handschuh H, et al. Hardware intrinsic security from D flip-flops. In: Proceedings of the 5th ACM Workshop on Scalable Trusted Computing, New York, 2010. 53--62. Google Scholar

[7] Suzuki D, Shimizu K. The glitch puf: a new delay-puf architecture exploiting glitch shapes. In: Proceedings of Crypt-Ographic Hardware and Embedded Systems, Berlin, 2010. 366--382. Google Scholar

[8] Ravikanth P. Physical One-way Functions. Dissertation for the Doctoral Degree. Boston: Massachusetts Institute of Technology, 2001. Google Scholar

[9] Bulens P, Standaert F, Quisquater J J. IET Inform Secur, 2010, 4: 125-136 CrossRef Google Scholar

[10] Ghaith H, Aykutlu, Berk S. CDs have fingerprints too. In: Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, Berlin, 2009. 348--362. Google Scholar

[11] Maiti A, Schaumont P. IEEE Trans VLSI Syst, 2013, 99: 1854-1864 Google Scholar

[12] Meguerdichian S, Potkonjak M. Device aging-based physical unclonable functions. In: Proceedings of the 48th ACM/EDAC/IEEE Design Automation Conference, New York, 2011. 288--289. Google Scholar

[13] Kirkpatrick M S, Bertino E. Software techniques to combat drift in PUF-based authentication systems. In: Proceedings of Workshop on Secure Component and System Identification, Cologne, 2010. Google Scholar