| Article ID | Journal | Published Year | Pages | File Type | 
|---|---|---|---|---|
| 464995 | Pervasive and Mobile Computing | 2008 | 12 Pages | 
Abstract
												We present a tamper-proof and lightweight challenge-response authentication scheme, based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, which shows the scheme to be secure against passive attacks, provided that it is hard to learn a threshold of halfspaces under the uniform distribution. Furthermore, we provide an extensive analysis of PUFs. In particular, we thoroughly derive a linear model for delay based PUFs, and finally we explore extensions of PUFs to produce efficient and tamper-resilient nn-to-nn mappings.
Related Topics
												
													Physical Sciences and Engineering
													Computer Science
													Computer Networks and Communications
												
											Authors
												Ghaith Hammouri, Erdinç Öztürk, Berk Sunar, 
											