Projecten per jaar
Samenvatting
We show that the XOR-method based on linear error-correcting codes can be applied to achieve the secret-key capacity of binary-symmetric SRAM-PUFs.
Then we focus on multiple key-bindings. We prove that no information is leaked by all the helper data about a single secret key both in the case where we use the same key all the time and when we use di↵erent keys. The notion of symmetry is crucial in these proofs.
Then we focus on multiple key-bindings. We prove that no information is leaked by all the helper data about a single secret key both in the case where we use the same key all the time and when we use di↵erent keys. The notion of symmetry is crucial in these proofs.
Originele taal-2 | Engels |
---|---|
Titel | Proceedings of the 37th WIC Symposium on Information Theory in the Benelux and the 6th Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux, 2016, May 19-20, 2016, Louvain, Louvain-la-Neuve, Belgium |
Plaats van productie | Leuven |
Uitgeverij | Katholieke Universiteit Leuven |
Pagina's | 120-127 |
Status | Gepubliceerd - 2016 |
Vingerafdruk
Duik in de onderzoeksthema's van 'Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-Method'. Samen vormen ze een unieke vingerafdruk.Projecten
- 1 Afgelopen
-
PATRIOT Eurostars Pufs: Anchors of Trust in Resource constralned envirOnmenTs
Willems, F. M. J., Kusters, C. J., Keijzers, A., Croes, S., Sanders, R., Alvarado, A. & Chen, B.
1/10/15 → 30/09/17
Project: Onderzoek direct