Skip to main content
Erschienen in: Journal of Cryptology 2/2017

13.04.2016

Photonic Side-Channel Analysis of Arbiter PUFs

verfasst von: Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers

Erschienen in: Journal of Cryptology | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As intended by its name, physically unclonable functions (PUFs) are considered as an ultimate solution to deal with insecure storage, hardware counterfeiting, and many other security problems. However, many different successful attacks have already revealed vulnerabilities of certain digital intrinsic PUFs. This paper demonstrates that legacy arbiter PUF and its popular extended versions (i.e., feed-forward and XOR-enhanced) can be completely and linearly characterized by means of photonic emission analysis. Our experimental setup is capable of measuring every PUF internal delay with a resolution of 6 ps. Due to this resolution, we indeed require only the theoretical minimum number of linear independent equations (i.e., physical measurements) to directly solve the underlying inhomogeneous linear system. Moreover, it is not required to know the actual PUF responses for our physical delay extraction. We present our practical results for an arbiter PUF implementation on a complex programmable logic device manufactured with a 180 nm process. Finally, we give an insight into photonic emission analysis of arbiter PUF on smaller chip architectures by performing experiments on a field programmable gate array manufactured with a 60 nm process.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Altera, MAX V Device Handbook (Altera Corporation, San Jose, 2011) Altera, MAX V Device Handbook (Altera Corporation, San Jose, 2011)
2.
Zurück zum Zitat Altera, Cyclone IV Device Handbook (Altera Corporation, San Jose, 2014) Altera, Cyclone IV Device Handbook (Altera Corporation, San Jose, 2014)
3.
Zurück zum Zitat G.T. Becker, The gap between promise and reality: on the insecurity of XOR arbiter PUFs, in Cryptographic Hardware and Embedded Systems—CHES 2015 (Springer, Berlin, 2015), pp. 535–555 G.T. Becker, The gap between promise and reality: on the insecurity of XOR arbiter PUFs, in Cryptographic Hardware and Embedded Systems—CHES 2015 (Springer, Berlin, 2015), pp. 535–555
4.
Zurück zum Zitat G.T. Becker, R. Kumar, Active and passive side-channel attacks on delay based PUF designs. IACR Cryptology ePrint Archive 2014, 287 (2014) G.T. Becker, R. Kumar, Active and passive side-channel attacks on delay based PUF designs. IACR Cryptology ePrint Archive 2014, 287 (2014)
5.
Zurück zum Zitat C. Boit, Fundamentals of photon emission (PEM) in silicon—electroluminescence for analysis of electronic circuit and device functionality, in Microelectronics Failure Analysis: Desk Reference (ASM International, New York, 2004), p. 356 ff C. Boit, Fundamentals of photon emission (PEM) in silicon—electroluminescence for analysis of electronic circuit and device functionality, in Microelectronics Failure Analysis: Desk Reference (ASM International, New York, 2004), p. 356 ff
6.
Zurück zum Zitat S. Briais, S. Caron, J.M. Cioranesco, J.L. Danger, S. Guilley, J.H. Jourdan, A. Milchior, D. Naccache, T. Porteboeuf, 3D Hardware canaries, in Cryptographic Hardware and Embedded Systems—CHES 2012 (Springer, Berlin, 2012) pp. 1–22 S. Briais, S. Caron, J.M. Cioranesco, J.L. Danger, S. Guilley, J.H. Jourdan, A. Milchior, D. Naccache, T. Porteboeuf, 3D Hardware canaries, in Cryptographic Hardware and Embedded Systems—CHES 2012 (Springer, Berlin, 2012) pp. 1–22
7.
Zurück zum Zitat J. Delvaux, D. Gu, D. Schellekens, I. Verbauwhede, Secure lightweight entity authentication with strong PUFs: mission impossible?, in Cryptographic Hardware and Embedded Systems—CHES 2014 (Springer, Berlin, 2014), pp. 451–475 J. Delvaux, D. Gu, D. Schellekens, I. Verbauwhede, Secure lightweight entity authentication with strong PUFs: mission impossible?, in Cryptographic Hardware and Embedded Systems—CHES 2014 (Springer, Berlin, 2014), pp. 451–475
8.
Zurück zum Zitat J. Delvaux, R. Peeters, D. Gu, I. Verbauwhede, A survey on lightweight entity authentication with strong PUFs. ACM Comput. Surv. 48(2), 26:1–26:42 (2015) J. Delvaux, R. Peeters, D. Gu, I. Verbauwhede, A survey on lightweight entity authentication with strong PUFs. ACM Comput. Surv. 48(2), 26:1–26:42 (2015)
9.
Zurück zum Zitat J. Delvaux, I. Verbauwhede, Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise, in 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, New York, 2013), pp. 137–142 J. Delvaux, I. Verbauwhede, Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise, in 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, New York, 2013), pp. 137–142
10.
Zurück zum Zitat J. Delvaux, I. Verbauwhede, Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes. Circuits Syst. I Regul. Pap. IEEE Trans. 61(6), 1701–1713 (2014) J. Delvaux, I. Verbauwhede, Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes. Circuits Syst. I Regul. Pap. IEEE Trans. 61(6), 1701–1713 (2014)
11.
Zurück zum Zitat J. Di-Battista, J.C. Courrege, B. Rouzeyre, L. Torres, P. Perdu, When failure analysis meets side-channel attacks, in Cryptographic Hardware and Embedded Systems, CHES 2010 (Springer, Berlin, 2010), pp. 188–202 J. Di-Battista, J.C. Courrege, B. Rouzeyre, L. Torres, P. Perdu, When failure analysis meets side-channel attacks, in Cryptographic Hardware and Embedded Systems, CHES 2010 (Springer, Berlin, 2010), pp. 188–202
13.
Zurück zum Zitat F. Ganji, J. Krämer, J.P. Seifert, S. Tajik, Lattice basis reduction attack against physically unclonable functions, in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (ACM, New York, 2015), pp. 1070–1080 F. Ganji, J. Krämer, J.P. Seifert, S. Tajik, Lattice basis reduction attack against physically unclonable functions, in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (ACM, New York, 2015), pp. 1070–1080
15.
Zurück zum Zitat F. Ganji, S. Tajik, J.P. Seifert, Let me prove it to you: RO PUFs are provably learnable, in Information Security and Cryptology-ICISC 2015 (Springer, Berlin, 2015) F. Ganji, S. Tajik, J.P. Seifert, Let me prove it to you: RO PUFs are provably learnable, in Information Security and Cryptology-ICISC 2015 (Springer, Berlin, 2015)
16.
Zurück zum Zitat F. Ganji, S. Tajik, J.P. Seifert, Why attackers win: on the learnability of XOR arbiter PUFs, in Trust and Trustworthy Computing (Springer, Berlin, 2015), pp. 22–39 F. Ganji, S. Tajik, J.P. Seifert, Why attackers win: on the learnability of XOR arbiter PUFs, in Trust and Trustworthy Computing (Springer, Berlin, 2015), pp. 22–39
17.
Zurück zum Zitat B. Gassend, D. Clarke, M. Van Dijk, S. Devadas, Controlled physical random functions, in Proceedings of the 18th Annual Computer Security Applications Conference, 2002 (IEEE, New York, 2002) pp. 149–160 B. Gassend, D. Clarke, M. Van Dijk, S. Devadas, Controlled physical random functions, in Proceedings of the 18th Annual Computer Security Applications Conference, 2002 (IEEE, New York, 2002) pp. 149–160
18.
Zurück zum Zitat B. Gassend, D. Clarke, M. Van Dijk, S. Devadas, Silicon physical random functions, in Proceedings of the 9th ACM Conference on Computer and Communications Security (ACM, New York, 2002), pp. 148–160 B. Gassend, D. Clarke, M. Van Dijk, S. Devadas, Silicon physical random functions, in Proceedings of the 9th ACM Conference on Computer and Communications Security (ACM, New York, 2002), pp. 148–160
19.
Zurück zum Zitat C. Helfmeier, C. Boit, D. Nedospasov, J.P. Seifert, Cloning physically unclonable functions, in 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, New York, 2013), pp. 1–6 C. Helfmeier, C. Boit, D. Nedospasov, J.P. Seifert, Cloning physically unclonable functions, in 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, New York, 2013), pp. 1–6
20.
Zurück zum Zitat C. Helfmeier, C. Boit, D. Nedospasov, S. Tajik, J.P. Seifert, Physical vulnerabilities of physically unclonable functions, in Proceedings of the Conference on Design, Automation & Test in Europe (European Design and Automation Association, Leuven, 2014), p. 350 C. Helfmeier, C. Boit, D. Nedospasov, S. Tajik, J.P. Seifert, Physical vulnerabilities of physically unclonable functions, in Proceedings of the Conference on Design, Automation & Test in Europe (European Design and Automation Association, Leuven, 2014), p. 350
21.
Zurück zum Zitat J. Krämer, D. Nedospasov, A. Schlösser, J.P. Seifert, Differential photonic emission analysis, in Constructive Side-Channel Analysis and Secure Design (Springer, Berlin, 2013), pp. 1–16 J. Krämer, D. Nedospasov, A. Schlösser, J.P. Seifert, Differential photonic emission analysis, in Constructive Side-Channel Analysis and Secure Design (Springer, Berlin, 2013), pp. 1–16
22.
Zurück zum Zitat J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. Van Dijk, S. Devadas, A technique to build a secret key in integrated circuits for identification and authentication applications, in VLSI Circuits, 2004. Digest of Technical Papers. 2004 Symposium on (IEEE, New York, 2004), pp. 176–179. J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. Van Dijk, S. Devadas, A technique to build a secret key in integrated circuits for identification and authentication applications, in VLSI Circuits, 2004. Digest of Technical Papers. 2004 Symposium on (IEEE, New York, 2004), pp. 176–179.
23.
Zurück zum Zitat D. Lim, J.W. Lee, B. Gassend, G.E. Suh, M. Van Dijk, S. Devadas, Extracting secret keys from integrated circuits. Very Large Scale Integr. (VLSI) Syst IEEE Trans. 13(10), 1200–1205 (2005) D. Lim, J.W. Lee, B. Gassend, G.E. Suh, M. Van Dijk, S. Devadas, Extracting secret keys from integrated circuits. Very Large Scale Integr. (VLSI) Syst IEEE Trans. 13(10), 1200–1205 (2005)
24.
Zurück zum Zitat R. Maes, Physically Unclonable Functions: Constructions, Properties and Applications (Springer, Berlin, 2013) R. Maes, Physically Unclonable Functions: Constructions, Properties and Applications (Springer, Berlin, 2013)
25.
Zurück zum Zitat R. Maes, I. Verbauwhede, Physically unclonable functions: a study on the state of the art and future research directions, in Towards Hardware-Intrinsic Security (Springer, Berlin, 2010), pp. 3–37 R. Maes, I. Verbauwhede, Physically unclonable functions: a study on the state of the art and future research directions, in Towards Hardware-Intrinsic Security (Springer, Berlin, 2010), pp. 3–37
26.
Zurück zum Zitat M. Majzoobi, F. Koushanfar, S. Devadas, FPGA PUF using programmable delay lines, in 2010 IEEE International Workshop on Information Forensics and Security (WIFS) (IEEE, New York, 2010), pp. 1–6 M. Majzoobi, F. Koushanfar, S. Devadas, FPGA PUF using programmable delay lines, in 2010 IEEE International Workshop on Information Forensics and Security (WIFS) (IEEE, New York, 2010), pp. 1–6
27.
Zurück zum Zitat D. Merli, J. Heyszl, B. Heinz, D. Schuster, F. Stumpf, G. Sigl, Localized electromagnetic analysis of RO PUFs, in 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, New York, 2013), pp. 19–24 D. Merli, J. Heyszl, B. Heinz, D. Schuster, F. Stumpf, G. Sigl, Localized electromagnetic analysis of RO PUFs, in 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, New York, 2013), pp. 19–24
28.
Zurück zum Zitat D. Merli, D. Schuster, F. Stumpf, G. Sigl, Semi-invasive EM attack on FPGA RO PUFs and countermeasures, in Proceedings of the Workshop on Embedded Systems Security (ACM, New York, 2011), p. 2 D. Merli, D. Schuster, F. Stumpf, G. Sigl, Semi-invasive EM attack on FPGA RO PUFs and countermeasures, in Proceedings of the Workshop on Embedded Systems Security (ACM, New York, 2011), p. 2
29.
Zurück zum Zitat D. Merli, D. Schuster, F. Stumpf, G. Sigl, Side-channel analysis of PUFs and fuzzy extractors, in Trust and Trustworthy Computing (Springer, Berlin, 2011), pp. 33–47 D. Merli, D. Schuster, F. Stumpf, G. Sigl, Side-channel analysis of PUFs and fuzzy extractors, in Trust and Trustworthy Computing (Springer, Berlin, 2011), pp. 33–47
30.
Zurück zum Zitat D. Nedospasov, A. Schlösser, J.P. Seifert, S. Orlic, Functional integrated circuit analysis, in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (2012), pp. 102–107 D. Nedospasov, A. Schlösser, J.P. Seifert, S. Orlic, Functional integrated circuit analysis, in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (2012), pp. 102–107
31.
Zurück zum Zitat D. Nedospasov, J.P. Seifert, C. Helfmeier, C. Boit, Invasive PUF analysis, in 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, New York, 2013), pp. 30–38 D. Nedospasov, J.P. Seifert, C. Helfmeier, C. Boit, Invasive PUF analysis, in 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, New York, 2013), pp. 30–38
32.
Zurück zum Zitat Y. Oren, A.R. Sadeghi, C. Wachsmann, On the effectiveness of the remanence decay side-channel to clone memory-based PUFs, in Cryptographic Hardware and Embedded Systems-CHES 2013 (Springer, Berlin, 2013), pp. 107–125 Y. Oren, A.R. Sadeghi, C. Wachsmann, On the effectiveness of the remanence decay side-channel to clone memory-based PUFs, in Cryptographic Hardware and Embedded Systems-CHES 2013 (Springer, Berlin, 2013), pp. 107–125
33.
Zurück zum Zitat E. Öztürk, G. Hammouri, B. Sunar, Towards robust low cost authentication for pervasive devices, in Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE International Conference on (IEEE, New York, 2008), pp. 170–178 E. Öztürk, G. Hammouri, B. Sunar, Towards robust low cost authentication for pervasive devices, in Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE International Conference on (IEEE, New York, 2008), pp. 170–178
34.
Zurück zum Zitat R. Pappu, B. Recht, J. Taylor, N. Gershenfeld, Physical one-way functions. Science 297(5589), 2026–2030 (2002) R. Pappu, B. Recht, J. Taylor, N. Gershenfeld, Physical one-way functions. Science 297(5589), 2026–2030 (2002)
35.
Zurück zum Zitat W. Rankl, W. Effing, Smart Card Handbook (4th ed.) (Wiley, Hoboken, 2010) W. Rankl, W. Effing, Smart Card Handbook (4th ed.) (Wiley, Hoboken, 2010)
36.
Zurück zum Zitat U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, J. Schmidhuber, Modeling attacks on physical unclonable functions, in Proceedings of the 17th ACM Conference on Computer and Communications Security (ACM, New York, 2010), pp. 237–249 U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, J. Schmidhuber, Modeling attacks on physical unclonable functions, in Proceedings of the 17th ACM Conference on Computer and Communications Security (ACM, New York, 2010), pp. 237–249
37.
Zurück zum Zitat U. Rührmair, J. Sölter, F. Sehnke, On the foundations of physical unclonable functions. IACR Cryptology ePrint Archive 2009, 277 (2009) U. Rührmair, J. Sölter, F. Sehnke, On the foundations of physical unclonable functions. IACR Cryptology ePrint Archive 2009, 277 (2009)
38.
Zurück zum Zitat U. Rührmair, X. Xu, J. Sölter, A. Mahmoud, M. Majzoobi, F. Koushanfar, W. Burleson, Efficient power and timing side channels for physical unclonable functions, in Cryptographic Hardware and Embedded Systems—CHES 2014 (Springer, Berlin, 2014), pp. 476–492 U. Rührmair, X. Xu, J. Sölter, A. Mahmoud, M. Majzoobi, F. Koushanfar, W. Burleson, Efficient power and timing side channels for physical unclonable functions, in Cryptographic Hardware and Embedded Systems—CHES 2014 (Springer, Berlin, 2014), pp. 476–492
39.
Zurück zum Zitat A.R. Sadeghi, I. Visconti, C. Wachsmann, Enhancing RFID Security and Privacy by Physically Unclonable Functions (Springer, Berlin, 2010) A.R. Sadeghi, I. Visconti, C. Wachsmann, Enhancing RFID Security and Privacy by Physically Unclonable Functions (Springer, Berlin, 2010)
40.
Zurück zum Zitat R. Schlangen, R. Leihkauf, U. Kerst, T. Lundquist, P. Egger, C. Boit, Physical analysis, trimming and editing of nanoscale IC function with backside FIB processing. Microelectron. Reliab. 49(9), 1158–1164 (2009) R. Schlangen, R. Leihkauf, U. Kerst, T. Lundquist, P. Egger, C. Boit, Physical analysis, trimming and editing of nanoscale IC function with backside FIB processing. Microelectron. Reliab. 49(9), 1158–1164 (2009)
41.
Zurück zum Zitat A. Schlösser, E. Dietz, S. Frohmann, S. Orlic, Highly resolved spatial and temporal photoemission analysis of integrated circuits. Meas. Sci. Technol. 24(3), 035102 (2013) A. Schlösser, E. Dietz, S. Frohmann, S. Orlic, Highly resolved spatial and temporal photoemission analysis of integrated circuits. Meas. Sci. Technol. 24(3), 035102 (2013)
42.
Zurück zum Zitat A. Schlösser, D. Nedospasov, J. Krämer, S. Orlic, J.P. Seifert, Simple photonic emission analysis of AES, in Cryptographic Hardware and Embedded Systems—CHES 2012 (Springer, Berlin, 2012), pp. 41–57 A. Schlösser, D. Nedospasov, J. Krämer, S. Orlic, J.P. Seifert, Simple photonic emission analysis of AES, in Cryptographic Hardware and Embedded Systems—CHES 2012 (Springer, Berlin, 2012), pp. 41–57
43.
Zurück zum Zitat B. Škorić, P. Tuyls, W. Ophey, Robust key extraction from physical uncloneable functions, in Applied Cryptography and Network Security (Springer, Berlin, 2005), pp. 407–422 B. Škorić, P. Tuyls, W. Ophey, Robust key extraction from physical uncloneable functions, in Applied Cryptography and Network Security (Springer, Berlin, 2005), pp. 407–422
44.
Zurück zum Zitat S. Skorobogatov, Optical fault masking attacks, in 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, New York, 2010), pp. 23–29 S. Skorobogatov, Optical fault masking attacks, in 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, New York, 2010), pp. 23–29
45.
Zurück zum Zitat S.P. Skorobogatov, R.J. Anderson, Optical fault induction attacks, in Cryptographic Hardware and Embedded Systems-CHES 2002 (Springer, Berlin, 2003), pp. 2–12 S.P. Skorobogatov, R.J. Anderson, Optical fault induction attacks, in Cryptographic Hardware and Embedded Systems-CHES 2002 (Springer, Berlin, 2003), pp. 2–12
46.
Zurück zum Zitat F. Stellari, P. Song, H.A. Ainspan, Functional block extraction for hardware security detection using time-integrated and time-resolved emission measurements, in VLSI Test Symposium (VTS), 2014 IEEE 32nd (IEEE, New York, 2014), pp. 1–6 F. Stellari, P. Song, H.A. Ainspan, Functional block extraction for hardware security detection using time-integrated and time-resolved emission measurements, in VLSI Test Symposium (VTS), 2014 IEEE 32nd (IEEE, New York, 2014), pp. 1–6
47.
Zurück zum Zitat G.E. Suh, S. Devadas, Physical unclonable functions for device authentication and secret key generation, in Proceedings of the 44th annual Design Automation Conference (ACM, New York, 2007), pp. 9–14 G.E. Suh, S. Devadas, Physical unclonable functions for device authentication and secret key generation, in Proceedings of the 44th annual Design Automation Conference (ACM, New York, 2007), pp. 9–14
48.
Zurück zum Zitat S. Tajik, E. Dietz, S. Frohmann, J.P. Seifert, D. Nedospasov, C. Helfmeier, C. Boit, H. Dittrich, Physical characterization of arbiter PUFs, in Cryptographic Hardware and Embedded Systems—CHES 2014 (Springer, Berlin, 2014), pp. 493–509 S. Tajik, E. Dietz, S. Frohmann, J.P. Seifert, D. Nedospasov, C. Helfmeier, C. Boit, H. Dittrich, Physical characterization of arbiter PUFs, in Cryptographic Hardware and Embedded Systems—CHES 2014 (Springer, Berlin, 2014), pp. 493–509
49.
Zurück zum Zitat S. Tajik, F. Ganji, J.P. Seifert, H. Lohrke, C. Boit, Laser fault attack on physically unclonable functions, in 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, New York, 2015) S. Tajik, F. Ganji, J.P. Seifert, H. Lohrke, C. Boit, Laser fault attack on physically unclonable functions, in 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (IEEE, New York, 2015)
50.
Zurück zum Zitat S. Tajik, D. Nedospasov, C. Helfmeier, J.P. Seifert, C. Boit, Emission analysis of hardware implementations, in 2014 17th Euromicro Conference on Digital System Design (DSD) (IEEE, New York, 2014), pp. 528–534 S. Tajik, D. Nedospasov, C. Helfmeier, J.P. Seifert, C. Boit, Emission analysis of hardware implementations, in 2014 17th Euromicro Conference on Digital System Design (DSD) (IEEE, New York, 2014), pp. 528–534
51.
Zurück zum Zitat P. Tuyls, L. Batina, RFID-tags for anti-counterfeiting, in Topics in Cryptology—CT-RSA 2006 (Springer, Berlin, 2006), pp. 115–131 P. Tuyls, L. Batina, RFID-tags for anti-counterfeiting, in Topics in Cryptology—CT-RSA 2006 (Springer, Berlin, 2006), pp. 115–131
52.
Zurück zum Zitat P. Tuyls, G.J. Schrijen, B. Škorić, J. Van Geloven, N. Verhaegh, R. Wolters, Read-proof hardware from protective coatings, in Cryptographic Hardware and Embedded Systems-CHES 2006 (Springer, Berlin, 2006), pp. 369–383 P. Tuyls, G.J. Schrijen, B. Škorić, J. Van Geloven, N. Verhaegh, R. Wolters, Read-proof hardware from protective coatings, in Cryptographic Hardware and Embedded Systems-CHES 2006 (Springer, Berlin, 2006), pp. 369–383
Metadaten
Titel
Photonic Side-Channel Analysis of Arbiter PUFs
verfasst von
Shahin Tajik
Enrico Dietz
Sven Frohmann
Helmar Dittrich
Dmitry Nedospasov
Clemens Helfmeier
Jean-Pierre Seifert
Christian Boit
Heinz-Wilhelm Hübers
Publikationsdatum
13.04.2016
Verlag
Springer US
Erschienen in
Journal of Cryptology / Ausgabe 2/2017
Print ISSN: 0933-2790
Elektronische ISSN: 1432-1378
DOI
https://doi.org/10.1007/s00145-016-9228-6

Weitere Artikel der Ausgabe 2/2017

Journal of Cryptology 2/2017 Zur Ausgabe