Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-Method

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Downloads (Pure)

Abstract

We show that the XOR-method based on linear error-correcting codes can be applied to achieve the secret-key capacity of binary-symmetric SRAM-PUFs.
Then we focus on multiple key-bindings. We prove that no information is leaked by all the helper data about a single secret key both in the case where we use the same key all the time and when we use di↵erent keys. The notion of symmetry is crucial in these proofs.
Original languageEnglish
Title of host publicationProceedings of the 37th WIC Symposium on Information Theory in the Benelux and the 6th Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux, 2016, May 19-20, 2016, Louvain, Louvain-la-Neuve, Belgium
Place of PublicationLeuven
PublisherKatholieke Universiteit Leuven
Pages120-127
Publication statusPublished - 2016

Fingerprint Dive into the research topics of 'Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-Method'. Together they form a unique fingerprint.

  • Projects

    PATRIOT Eurostars Pufs: Anchors of Trust in Resource constralned envirOnmenTs

    Willems, F. M. J., Kusters, C. J. (., Keijzers, A., Keijzers, A., Croes, S., Willems, F. M. J., Sanders, R., Alvarado, A. & Chen, B.

    1/10/1530/09/17

    Project: Research direct

    Cite this

    Kusters, C. J., Ignatenko, T., & Willems, F. M. J. (2016). Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-Method. In Proceedings of the 37th WIC Symposium on Information Theory in the Benelux and the 6th Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux, 2016, May 19-20, 2016, Louvain, Louvain-la-Neuve, Belgium (pp. 120-127). Katholieke Universiteit Leuven.