Title | ||
---|---|---|
FPGA implementation technique for power consumption aware tamper resistance accelerator of lightweight PUF. |
Abstract | ||
---|---|---|
The semiconductor counterfeiting has become a serious problem. Physical Unclonable Function (PUF) is attracted attention as a countermeasure. PUF can generate a unique ID for each device utilizing a variation during manufacturing. However, PUF is vulnerable to modeling attacks. In addition, it is reported that side-channel information allows modeling attacks effectively. To secure the safety of semiconductors, the evaluation of tamper resistance of PUFs is important. This study proposes an evaluation method for Lightweight PUF on FPGA. The proposed method can analyze the deference of power consumption, which affects tamper resistance. Experiments prove the validity of the proposed method. |
Year | Venue | Keywords |
---|---|---|
2017 | IEEE Global Conference on Consumer Electronics | hardware security,Phisycal Unclonable Functoin,side-channel analysis |
Field | DocType | ISSN |
Countermeasure,Computer science,Field-programmable gate array,Power demand,Physical unclonable function,Tamper resistance,Embedded system,Power consumption | Conference | 2378-8143 |
Citations | PageRank | References |
0 | 0.34 | 4 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yoshiya Ikezaki | 1 | 0 | 1.01 |
Nozaki, Y. | 2 | 5 | 11.62 |
Hideki Nagata | 3 | 0 | 0.34 |
Masaya Yoshikawa | 4 | 25 | 23.93 |