Presentation | 2010/11/23 Performance Evaluation for PUF-based Authentication Systems with Shift Post-processing Hyunho KANG, Yohei HORI, Toshihiro KATASHITA, Akashi SATOH, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | A physical unclonable function (PUF) is a physical system with a device manufacturing variations and could be useful for authentication of integrated circuits. However, it is claimed that the amount of randomness in the PUF output is limited. Therefore, the response of the PUF cannot be used directly as a key. In this paper we discuss a making method of the PUF output with much more randomness while maintaining the reliability. In order to do this, a simple shift post-processing will apply to the PUF output. The experimental results show that the authentication system using shifted response data have improved performance compared to non-shifted data. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | physical unclonable function(PUF) / authentication / shift post-processing |
Paper # | RECONF-2010-49 |
Date of Issue |
Conference Information | |
Committee | RECONF |
---|---|
Conference Date | 2010/11/23(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Reconfigurable Systems (RECONF) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Performance Evaluation for PUF-based Authentication Systems with Shift Post-processing |
Sub Title (in English) | |
Keyword(1) | physical unclonable function(PUF) |
Keyword(2) | authentication |
Keyword(3) | shift post-processing |
1st Author's Name | Hyunho KANG |
1st Author's Affiliation | Research Center for Information Security(RCIS):Advanced Industrial Science and Technology(AIST)() |
2nd Author's Name | Yohei HORI |
2nd Author's Affiliation | Research Center for Information Security(RCIS):Advanced Industrial Science and Technology(AIST) |
3rd Author's Name | Toshihiro KATASHITA |
3rd Author's Affiliation | Research Center for Information Security(RCIS):Advanced Industrial Science and Technology(AIST) |
4th Author's Name | Akashi SATOH |
4th Author's Affiliation | Research Center for Information Security(RCIS):Advanced Industrial Science and Technology(AIST) |
Date | 2010/11/23 |
Paper # | RECONF-2010-49 |
Volume (vol) | vol.110 |
Number (no) | 319 |
Page | pp.pp.- |
#Pages | 4 |
Date of Issue |