Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-Method

C.J. Kusters, T. Ignatenko, F.M.J. Willems

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Downloads (Pure)


We show that the XOR-method based on linear error-correcting codes can be applied to achieve the secret-key capacity of binary-symmetric SRAM-PUFs.
Then we focus on multiple key-bindings. We prove that no information is leaked by all the helper data about a single secret key both in the case where we use the same key all the time and when we use di↵erent keys. The notion of symmetry is crucial in these proofs.
Original languageEnglish
Title of host publicationProceedings of the 37th WIC Symposium on Information Theory in the Benelux and the 6th Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux, 2016, May 19-20, 2016, Louvain, Louvain-la-Neuve, Belgium
Place of PublicationLeuven
PublisherKatholieke Universiteit Leuven
Publication statusPublished - 2016


Dive into the research topics of 'Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-Method'. Together they form a unique fingerprint.

Cite this