Skip to main content
Top
Published in: Journal of Cryptology 2/2017

13-04-2016

Photonic Side-Channel Analysis of Arbiter PUFs

Authors: Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers

Published in: Journal of Cryptology | Issue 2/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As intended by its name, physically unclonable functions (PUFs) are considered as an ultimate solution to deal with insecure storage, hardware counterfeiting, and many other security problems. However, many different successful attacks have already revealed vulnerabilities of certain digital intrinsic PUFs. This paper demonstrates that legacy arbiter PUF and its popular extended versions (i.e., feed-forward and XOR-enhanced) can be completely and linearly characterized by means of photonic emission analysis. Our experimental setup is capable of measuring every PUF internal delay with a resolution of 6 ps. Due to this resolution, we indeed require only the theoretical minimum number of linear independent equations (i.e., physical measurements) to directly solve the underlying inhomogeneous linear system. Moreover, it is not required to know the actual PUF responses for our physical delay extraction. We present our practical results for an arbiter PUF implementation on a complex programmable logic device manufactured with a 180 nm process. Finally, we give an insight into photonic emission analysis of arbiter PUF on smaller chip architectures by performing experiments on a field programmable gate array manufactured with a 60 nm process.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Altera, MAX V Device Handbook (Altera Corporation, San Jose, 2011) Altera, MAX V Device Handbook (Altera Corporation, San Jose, 2011)
2.
go back to reference Altera, Cyclone IV Device Handbook (Altera Corporation, San Jose, 2014) Altera, Cyclone IV Device Handbook (Altera Corporation, San Jose, 2014)
3.
go back to reference G.T. Becker, The gap between promise and reality: on the insecurity of XOR arbiter PUFs, in Cryptographic Hardware and Embedded Systems—CHES 2015 (Springer, Berlin, 2015), pp. 535–555 G.T. Becker, The gap between promise and reality: on the insecurity of XOR arbiter PUFs, in Cryptographic Hardware and Embedded Systems—CHES 2015 (Springer, Berlin, 2015), pp. 535–555
4.
go back to reference G.T. Becker, R. Kumar, Active and passive side-channel attacks on delay based PUF designs. IACR Cryptology ePrint Archive 2014, 287 (2014) G.T. Becker, R. Kumar, Active and passive side-channel attacks on delay based PUF designs. IACR Cryptology ePrint Archive 2014, 287 (2014)
5.
go back to reference C. Boit, Fundamentals of photon emission (PEM) in silicon—electroluminescence for analysis of electronic circuit and device functionality, in Microelectronics Failure Analysis: Desk Reference (ASM International, New York, 2004), p. 356 ff C. Boit, Fundamentals of photon emission (PEM) in silicon—electroluminescence for analysis of electronic circuit and device functionality, in Microelectronics Failure Analysis: Desk Reference (ASM International, New York, 2004), p. 356 ff
6.
go back to reference S. Briais, S. Caron, J.M. Cioranesco, J.L. Danger, S. Guilley, J.H. Jourdan, A. Milchior, D. Naccache, T. Porteboeuf, 3D Hardware canaries, in Cryptographic Hardware and Embedded Systems—CHES 2012 (Springer, Berlin, 2012) pp. 1–22 S. Briais, S. Caron, J.M. Cioranesco, J.L. Danger, S. Guilley, J.H. Jourdan, A. Milchior, D. Naccache, T. Porteboeuf, 3D Hardware canaries, in Cryptographic Hardware and Embedded Systems—CHES 2012 (Springer, Berlin, 2012) pp. 1–22
7.
go back to reference J. Delvaux, D. Gu, D. Schellekens, I. Verbauwhede, Secure lightweight entity authentication with strong PUFs: mission impossible?, in Cryptographic Hardware and Embedded Systems—CHES 2014 (Springer, Berlin, 2014), pp. 451–475 J. Delvaux, D. Gu, D. Schellekens, I. Verbauwhede, Secure lightweight entity authentication with strong PUFs: mission impossible?, in Cryptographic Hardware and Embedded Systems—CHES 2014 (Springer, Berlin, 2014), pp. 451–475
8.
go back to reference J. Delvaux, R. Peeters, D. Gu, I. Verbauwhede, A survey on lightweight entity authentication with strong PUFs. ACM Comput. Surv. 48(2), 26:1–26:42 (2015) J. Delvaux, R. Peeters, D. Gu, I. Verbauwhede, A survey on lightweight entity authentication with strong PUFs. ACM Comput. Surv. 48(2), 26:1–26:42 (2015)
9.
go back to reference J. Delvaux, I. Verbauwhede, Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise, in 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, New York, 2013), pp. 137–142 J. Delvaux, I. Verbauwhede, Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise, in 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, New York, 2013), pp. 137–142
10.
go back to reference J. Delvaux, I. Verbauwhede, Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes. Circuits Syst. I Regul. Pap. IEEE Trans. 61(6), 1701–1713 (2014) J. Delvaux, I. Verbauwhede, Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes. Circuits Syst. I Regul. Pap. IEEE Trans. 61(6), 1701–1713 (2014)
11.
go back to reference J. Di-Battista, J.C. Courrege, B. Rouzeyre, L. Torres, P. Perdu, When failure analysis meets side-channel attacks, in Cryptographic Hardware and Embedded Systems, CHES 2010 (Springer, Berlin, 2010), pp. 188–202 J. Di-Battista, J.C. Courrege, B. Rouzeyre, L. Torres, P. Perdu, When failure analysis meets side-channel attacks, in Cryptographic Hardware and Embedded Systems, CHES 2010 (Springer, Berlin, 2010), pp. 188–202
13.
go back to reference F. Ganji, J. Krämer, J.P. Seifert, S. Tajik, Lattice basis reduction attack against physically unclonable functions, in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (ACM, New York, 2015), pp. 1070–1080 F. Ganji, J. Krämer, J.P. Seifert, S. Tajik, Lattice basis reduction attack against physically unclonable functions, in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (ACM, New York, 2015), pp. 1070–1080
15.
go back to reference F. Ganji, S. Tajik, J.P. Seifert, Let me prove it to you: RO PUFs are provably learnable, in Information Security and Cryptology-ICISC 2015 (Springer, Berlin, 2015) F. Ganji, S. Tajik, J.P. Seifert, Let me prove it to you: RO PUFs are provably learnable, in Information Security and Cryptology-ICISC 2015 (Springer, Berlin, 2015)
16.
go back to reference F. Ganji, S. Tajik, J.P. Seifert, Why attackers win: on the learnability of XOR arbiter PUFs, in Trust and Trustworthy Computing (Springer, Berlin, 2015), pp. 22–39 F. Ganji, S. Tajik, J.P. Seifert, Why attackers win: on the learnability of XOR arbiter PUFs, in Trust and Trustworthy Computing (Springer, Berlin, 2015), pp. 22–39
17.
go back to reference B. Gassend, D. Clarke, M. Van Dijk, S. Devadas, Controlled physical random functions, in Proceedings of the 18th Annual Computer Security Applications Conference, 2002 (IEEE, New York, 2002) pp. 149–160 B. Gassend, D. Clarke, M. Van Dijk, S. Devadas, Controlled physical random functions, in Proceedings of the 18th Annual Computer Security Applications Conference, 2002 (IEEE, New York, 2002) pp. 149–160
18.
go back to reference B. Gassend, D. Clarke, M. Van Dijk, S. Devadas, Silicon physical random functions, in Proceedings of the 9th ACM Conference on Computer and Communications Security (ACM, New York, 2002), pp. 148–160 B. Gassend, D. Clarke, M. Van Dijk, S. Devadas, Silicon physical random functions, in Proceedings of the 9th ACM Conference on Computer and Communications Security (ACM, New York, 2002), pp. 148–160
19.
go back to reference C. Helfmeier, C. Boit, D. Nedospasov, J.P. Seifert, Cloning physically unclonable functions, in 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, New York, 2013), pp. 1–6 C. Helfmeier, C. Boit, D. Nedospasov, J.P. Seifert, Cloning physically unclonable functions, in 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, New York, 2013), pp. 1–6
20.
go back to reference C. Helfmeier, C. Boit, D. Nedospasov, S. Tajik, J.P. Seifert, Physical vulnerabilities of physically unclonable functions, in Proceedings of the Conference on Design, Automation & Test in Europe (European Design and Automation Association, Leuven, 2014), p. 350 C. Helfmeier, C. Boit, D. Nedospasov, S. Tajik, J.P. Seifert, Physical vulnerabilities of physically unclonable functions, in Proceedings of the Conference on Design, Automation & Test in Europe (European Design and Automation Association, Leuven, 2014), p. 350
21.
go back to reference J. Krämer, D. Nedospasov, A. Schlösser, J.P. Seifert, Differential photonic emission analysis, in Constructive Side-Channel Analysis and Secure Design (Springer, Berlin, 2013), pp. 1–16 J. Krämer, D. Nedospasov, A. Schlösser, J.P. Seifert, Differential photonic emission analysis, in Constructive Side-Channel Analysis and Secure Design (Springer, Berlin, 2013), pp. 1–16
22.
go back to reference J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. Van Dijk, S. Devadas, A technique to build a secret key in integrated circuits for identification and authentication applications, in VLSI Circuits, 2004. Digest of Technical Papers. 2004 Symposium on (IEEE, New York, 2004), pp. 176–179. J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. Van Dijk, S. Devadas, A technique to build a secret key in integrated circuits for identification and authentication applications, in VLSI Circuits, 2004. Digest of Technical Papers. 2004 Symposium on (IEEE, New York, 2004), pp. 176–179.
23.
go back to reference D. Lim, J.W. Lee, B. Gassend, G.E. Suh, M. Van Dijk, S. Devadas, Extracting secret keys from integrated circuits. Very Large Scale Integr. (VLSI) Syst IEEE Trans. 13(10), 1200–1205 (2005) D. Lim, J.W. Lee, B. Gassend, G.E. Suh, M. Van Dijk, S. Devadas, Extracting secret keys from integrated circuits. Very Large Scale Integr. (VLSI) Syst IEEE Trans. 13(10), 1200–1205 (2005)
24.
go back to reference R. Maes, Physically Unclonable Functions: Constructions, Properties and Applications (Springer, Berlin, 2013) R. Maes, Physically Unclonable Functions: Constructions, Properties and Applications (Springer, Berlin, 2013)
25.
go back to reference R. Maes, I. Verbauwhede, Physically unclonable functions: a study on the state of the art and future research directions, in Towards Hardware-Intrinsic Security (Springer, Berlin, 2010), pp. 3–37 R. Maes, I. Verbauwhede, Physically unclonable functions: a study on the state of the art and future research directions, in Towards Hardware-Intrinsic Security (Springer, Berlin, 2010), pp. 3–37
26.
go back to reference M. Majzoobi, F. Koushanfar, S. Devadas, FPGA PUF using programmable delay lines, in 2010 IEEE International Workshop on Information Forensics and Security (WIFS) (IEEE, New York, 2010), pp. 1–6 M. Majzoobi, F. Koushanfar, S. Devadas, FPGA PUF using programmable delay lines, in 2010 IEEE International Workshop on Information Forensics and Security (WIFS) (IEEE, New York, 2010), pp. 1–6
27.
go back to reference D. Merli, J. Heyszl, B. Heinz, D. Schuster, F. Stumpf, G. Sigl, Localized electromagnetic analysis of RO PUFs, in 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, New York, 2013), pp. 19–24 D. Merli, J. Heyszl, B. Heinz, D. Schuster, F. Stumpf, G. Sigl, Localized electromagnetic analysis of RO PUFs, in 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, New York, 2013), pp. 19–24
28.
go back to reference D. Merli, D. Schuster, F. Stumpf, G. Sigl, Semi-invasive EM attack on FPGA RO PUFs and countermeasures, in Proceedings of the Workshop on Embedded Systems Security (ACM, New York, 2011), p. 2 D. Merli, D. Schuster, F. Stumpf, G. Sigl, Semi-invasive EM attack on FPGA RO PUFs and countermeasures, in Proceedings of the Workshop on Embedded Systems Security (ACM, New York, 2011), p. 2
29.
go back to reference D. Merli, D. Schuster, F. Stumpf, G. Sigl, Side-channel analysis of PUFs and fuzzy extractors, in Trust and Trustworthy Computing (Springer, Berlin, 2011), pp. 33–47 D. Merli, D. Schuster, F. Stumpf, G. Sigl, Side-channel analysis of PUFs and fuzzy extractors, in Trust and Trustworthy Computing (Springer, Berlin, 2011), pp. 33–47
30.
go back to reference D. Nedospasov, A. Schlösser, J.P. Seifert, S. Orlic, Functional integrated circuit analysis, in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (2012), pp. 102–107 D. Nedospasov, A. Schlösser, J.P. Seifert, S. Orlic, Functional integrated circuit analysis, in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (2012), pp. 102–107
31.
go back to reference D. Nedospasov, J.P. Seifert, C. Helfmeier, C. Boit, Invasive PUF analysis, in 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, New York, 2013), pp. 30–38 D. Nedospasov, J.P. Seifert, C. Helfmeier, C. Boit, Invasive PUF analysis, in 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, New York, 2013), pp. 30–38
32.
go back to reference Y. Oren, A.R. Sadeghi, C. Wachsmann, On the effectiveness of the remanence decay side-channel to clone memory-based PUFs, in Cryptographic Hardware and Embedded Systems-CHES 2013 (Springer, Berlin, 2013), pp. 107–125 Y. Oren, A.R. Sadeghi, C. Wachsmann, On the effectiveness of the remanence decay side-channel to clone memory-based PUFs, in Cryptographic Hardware and Embedded Systems-CHES 2013 (Springer, Berlin, 2013), pp. 107–125
33.
go back to reference E. Öztürk, G. Hammouri, B. Sunar, Towards robust low cost authentication for pervasive devices, in Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE International Conference on (IEEE, New York, 2008), pp. 170–178 E. Öztürk, G. Hammouri, B. Sunar, Towards robust low cost authentication for pervasive devices, in Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE International Conference on (IEEE, New York, 2008), pp. 170–178
34.
go back to reference R. Pappu, B. Recht, J. Taylor, N. Gershenfeld, Physical one-way functions. Science 297(5589), 2026–2030 (2002) R. Pappu, B. Recht, J. Taylor, N. Gershenfeld, Physical one-way functions. Science 297(5589), 2026–2030 (2002)
35.
go back to reference W. Rankl, W. Effing, Smart Card Handbook (4th ed.) (Wiley, Hoboken, 2010) W. Rankl, W. Effing, Smart Card Handbook (4th ed.) (Wiley, Hoboken, 2010)
36.
go back to reference U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, J. Schmidhuber, Modeling attacks on physical unclonable functions, in Proceedings of the 17th ACM Conference on Computer and Communications Security (ACM, New York, 2010), pp. 237–249 U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, J. Schmidhuber, Modeling attacks on physical unclonable functions, in Proceedings of the 17th ACM Conference on Computer and Communications Security (ACM, New York, 2010), pp. 237–249
37.
go back to reference U. Rührmair, J. Sölter, F. Sehnke, On the foundations of physical unclonable functions. IACR Cryptology ePrint Archive 2009, 277 (2009) U. Rührmair, J. Sölter, F. Sehnke, On the foundations of physical unclonable functions. IACR Cryptology ePrint Archive 2009, 277 (2009)
38.
go back to reference U. Rührmair, X. Xu, J. Sölter, A. Mahmoud, M. Majzoobi, F. Koushanfar, W. Burleson, Efficient power and timing side channels for physical unclonable functions, in Cryptographic Hardware and Embedded Systems—CHES 2014 (Springer, Berlin, 2014), pp. 476–492 U. Rührmair, X. Xu, J. Sölter, A. Mahmoud, M. Majzoobi, F. Koushanfar, W. Burleson, Efficient power and timing side channels for physical unclonable functions, in Cryptographic Hardware and Embedded Systems—CHES 2014 (Springer, Berlin, 2014), pp. 476–492
39.
go back to reference A.R. Sadeghi, I. Visconti, C. Wachsmann, Enhancing RFID Security and Privacy by Physically Unclonable Functions (Springer, Berlin, 2010) A.R. Sadeghi, I. Visconti, C. Wachsmann, Enhancing RFID Security and Privacy by Physically Unclonable Functions (Springer, Berlin, 2010)
40.
go back to reference R. Schlangen, R. Leihkauf, U. Kerst, T. Lundquist, P. Egger, C. Boit, Physical analysis, trimming and editing of nanoscale IC function with backside FIB processing. Microelectron. Reliab. 49(9), 1158–1164 (2009) R. Schlangen, R. Leihkauf, U. Kerst, T. Lundquist, P. Egger, C. Boit, Physical analysis, trimming and editing of nanoscale IC function with backside FIB processing. Microelectron. Reliab. 49(9), 1158–1164 (2009)
41.
go back to reference A. Schlösser, E. Dietz, S. Frohmann, S. Orlic, Highly resolved spatial and temporal photoemission analysis of integrated circuits. Meas. Sci. Technol. 24(3), 035102 (2013) A. Schlösser, E. Dietz, S. Frohmann, S. Orlic, Highly resolved spatial and temporal photoemission analysis of integrated circuits. Meas. Sci. Technol. 24(3), 035102 (2013)
42.
go back to reference A. Schlösser, D. Nedospasov, J. Krämer, S. Orlic, J.P. Seifert, Simple photonic emission analysis of AES, in Cryptographic Hardware and Embedded Systems—CHES 2012 (Springer, Berlin, 2012), pp. 41–57 A. Schlösser, D. Nedospasov, J. Krämer, S. Orlic, J.P. Seifert, Simple photonic emission analysis of AES, in Cryptographic Hardware and Embedded Systems—CHES 2012 (Springer, Berlin, 2012), pp. 41–57
43.
go back to reference B. Škorić, P. Tuyls, W. Ophey, Robust key extraction from physical uncloneable functions, in Applied Cryptography and Network Security (Springer, Berlin, 2005), pp. 407–422 B. Škorić, P. Tuyls, W. Ophey, Robust key extraction from physical uncloneable functions, in Applied Cryptography and Network Security (Springer, Berlin, 2005), pp. 407–422
44.
go back to reference S. Skorobogatov, Optical fault masking attacks, in 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, New York, 2010), pp. 23–29 S. Skorobogatov, Optical fault masking attacks, in 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, New York, 2010), pp. 23–29
45.
go back to reference S.P. Skorobogatov, R.J. Anderson, Optical fault induction attacks, in Cryptographic Hardware and Embedded Systems-CHES 2002 (Springer, Berlin, 2003), pp. 2–12 S.P. Skorobogatov, R.J. Anderson, Optical fault induction attacks, in Cryptographic Hardware and Embedded Systems-CHES 2002 (Springer, Berlin, 2003), pp. 2–12
46.
go back to reference F. Stellari, P. Song, H.A. Ainspan, Functional block extraction for hardware security detection using time-integrated and time-resolved emission measurements, in VLSI Test Symposium (VTS), 2014 IEEE 32nd (IEEE, New York, 2014), pp. 1–6 F. Stellari, P. Song, H.A. Ainspan, Functional block extraction for hardware security detection using time-integrated and time-resolved emission measurements, in VLSI Test Symposium (VTS), 2014 IEEE 32nd (IEEE, New York, 2014), pp. 1–6
47.
go back to reference G.E. Suh, S. Devadas, Physical unclonable functions for device authentication and secret key generation, in Proceedings of the 44th annual Design Automation Conference (ACM, New York, 2007), pp. 9–14 G.E. Suh, S. Devadas, Physical unclonable functions for device authentication and secret key generation, in Proceedings of the 44th annual Design Automation Conference (ACM, New York, 2007), pp. 9–14
48.
go back to reference S. Tajik, E. Dietz, S. Frohmann, J.P. Seifert, D. Nedospasov, C. Helfmeier, C. Boit, H. Dittrich, Physical characterization of arbiter PUFs, in Cryptographic Hardware and Embedded Systems—CHES 2014 (Springer, Berlin, 2014), pp. 493–509 S. Tajik, E. Dietz, S. Frohmann, J.P. Seifert, D. Nedospasov, C. Helfmeier, C. Boit, H. Dittrich, Physical characterization of arbiter PUFs, in Cryptographic Hardware and Embedded Systems—CHES 2014 (Springer, Berlin, 2014), pp. 493–509
49.
go back to reference S. Tajik, F. Ganji, J.P. Seifert, H. Lohrke, C. Boit, Laser fault attack on physically unclonable functions, in 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, New York, 2015) S. Tajik, F. Ganji, J.P. Seifert, H. Lohrke, C. Boit, Laser fault attack on physically unclonable functions, in 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, New York, 2015)
50.
go back to reference S. Tajik, D. Nedospasov, C. Helfmeier, J.P. Seifert, C. Boit, Emission analysis of hardware implementations, in 2014 17th Euromicro Conference on Digital System Design (DSD) (IEEE, New York, 2014), pp. 528–534 S. Tajik, D. Nedospasov, C. Helfmeier, J.P. Seifert, C. Boit, Emission analysis of hardware implementations, in 2014 17th Euromicro Conference on Digital System Design (DSD) (IEEE, New York, 2014), pp. 528–534
51.
go back to reference P. Tuyls, L. Batina, RFID-tags for anti-counterfeiting, in Topics in Cryptology—CT-RSA 2006 (Springer, Berlin, 2006), pp. 115–131 P. Tuyls, L. Batina, RFID-tags for anti-counterfeiting, in Topics in Cryptology—CT-RSA 2006 (Springer, Berlin, 2006), pp. 115–131
52.
go back to reference P. Tuyls, G.J. Schrijen, B. Škorić, J. Van Geloven, N. Verhaegh, R. Wolters, Read-proof hardware from protective coatings, in Cryptographic Hardware and Embedded Systems-CHES 2006 (Springer, Berlin, 2006), pp. 369–383 P. Tuyls, G.J. Schrijen, B. Škorić, J. Van Geloven, N. Verhaegh, R. Wolters, Read-proof hardware from protective coatings, in Cryptographic Hardware and Embedded Systems-CHES 2006 (Springer, Berlin, 2006), pp. 369–383
Metadata
Title
Photonic Side-Channel Analysis of Arbiter PUFs
Authors
Shahin Tajik
Enrico Dietz
Sven Frohmann
Helmar Dittrich
Dmitry Nedospasov
Clemens Helfmeier
Jean-Pierre Seifert
Christian Boit
Heinz-Wilhelm Hübers
Publication date
13-04-2016
Publisher
Springer US
Published in
Journal of Cryptology / Issue 2/2017
Print ISSN: 0933-2790
Electronic ISSN: 1432-1378
DOI
https://doi.org/10.1007/s00145-016-9228-6

Other articles of this Issue 2/2017

Journal of Cryptology 2/2017 Go to the issue

Premium Partner