Implementation of delay-based Physical Unclonable Functions (PUFs) on FPGAs poses significant challenges due to high requirements, such as the generation of unique and reliable keys. These requirements must be fulfill...
详细信息
ISBN:
(数字)9798350363517
ISBN:
(纸本)9798350363524
Implementation of delay-based Physical Unclonable Functions (PUFs) on FPGAs poses significant challenges due to high requirements, such as the generation of unique and reliable keys. These requirements must be fulfilled, especially when using PUFs in security applications, otherwise security cannot be guaranteed. In addition, it must be ensured that physical disturbances such as fluctuations in the ambient temperature do not have a major impact on the performance of the PUF and therefore on security. In this paper, the implementation and evaluation of a novel 56-bit 2–4 Double Arbiter PUF (DAPUF) is presented. For performance analysis, the proposed 2–4 DAPUF is investigated with 20 Digilent Nexys-3 (AMD-Xilinx Spartan-6 FPGA) boards and a large data set of 30 million challenges under varying ambient temperature in the range from 0°C to 50°C. Our experimental results show that the proposed 2–4 DAPUF is resistant to temperature fluctuations. Here, the maximum change in reliability amounts to 1.18 %. For randomness and uniqueness, the changes are less than 0.50 %. Furthermore, our results show that performance can be significantly improved by combining PUFs with XOR operations.
In this article, a κ-Ga2O3 cap layer is introduced as gate dielectric to achieve E-mode GaN p-channel heterostructure FETs (p-HFETs). Due to the high spontaneous polarization of κ-Ga2O3, 2DEG that up to 1.51 × ...
详细信息
Automated and robust portrait quality assessment (PQA) is of paramount importance in high-impact applications such as smartphone photography. This paper presents FHIQA, a learning-based approach to PQA that introduces...
详细信息
This work describes in detail how to learn and solve the Rubik’s cube game (or puzzle) in the General Board Game (GBG) learning and playing framework. We cover the cube sizes 2x2x2 and 3x3x3. We describe in detail th...
详细信息
5G, the fifth generation of wireless technology, has a significant impact on networking, enable faster data transfer speeds, lower latency, higher capacity, and greater reliability. An instantaneous response time is c...
详细信息
The security of IoT (Internet of Things) devices and the protection of sensitive information processed by these devices such as personal data, sensor values, process-related information is an important and difficult c...
详细信息
ISBN:
(数字)9798331540289
ISBN:
(纸本)9798331540296
The security of IoT (Internet of Things) devices and the protection of sensitive information processed by these devices such as personal data, sensor values, process-related information is an important and difficult challenge. A major task in IoT communication is secure identification of devices. Unfortunately, traditional cryptographic methods are often not suitable for IoT devices due to their limited hardware resources. However, typical methods are computationally intensive, require a large amount of memory, and have a high-power consumption. On the other hand, Physical Unclonable Functions (PUFs) are low-cost and lightweight hardware-based primitives that can be used as a security component to protect data against third parties and thus increase security of a device. In this paper, the challenges and vulnerabilities in the development of PUF-based authentication protocols are presented. To this end, a security analysis of different approaches known from literature are discussed. Furthermore, possible attack vectors and prevention techniques are also considered.
We experimentally demonstrate an inverse-designed mode-division multiplexer on an 800-nm-thick silicon nitride platform. The multiplexer is optimized within a 14.4 × 9.6 µm2 footprint. The measured insertion...
详细信息
Resource allocation in cloud quantum computing environments is a challenging problem due to the combinatorial nature of quantum resources and the strategic behavior of users. This paper presents a novel Game Theoretic...
详细信息
ISBN:
(数字)9798331540142
ISBN:
(纸本)9798331540159
Resource allocation in cloud quantum computing environments is a challenging problem due to the combinatorial nature of quantum resources and the strategic behavior of users. This paper presents a novel Game Theoretic Quantum Dynamic Combinatorial Auction (GTQBDCA) framework for efficient and fair allocation of quantum resources in cloud environments. By integrating game theory and dynamic combinatorial auctions, our approach addresses the unique challenges of quantum resource allocation, ensuring optimal resource utilization and user satisfaction. We demonstrate the effectiveness of our framework through theoretical analysis and simulation results.
The sustainable inventory model is a framework designed to ensure manufacturing processes' sustainability while maintaining profitability. During manufacturing, some items may experience degradation, resulting in ...
详细信息
Electricity theft detection (ETD) is crucial for smart grids to maintain their cost-effectiveness. Current approaches for identifying theft struggle with large datasets of electricity use owing to problems with missin...
详细信息
暂无评论