Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-Method

C.J. Kusters, T. Ignatenko, F.M.J. Willems

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

4 Downloads (Pure)


We show that the XOR-method based on linear error-correcting codes can be applied to achieve the secret-key capacity of binary-symmetric SRAM-PUFs.
Then we focus on multiple key-bindings. We prove that no information is leaked by all the helper data about a single secret key both in the case where we use the same key all the time and when we use di↵erent keys. The notion of symmetry is crucial in these proofs.
Originele taal-2Engels
TitelProceedings of the 37th WIC Symposium on Information Theory in the Benelux and the 6th Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux, 2016, May 19-20, 2016, Louvain, Louvain-la-Neuve, Belgium
Plaats van productieLeuven
UitgeverijKatholieke Universiteit Leuven
StatusGepubliceerd - 2016


Duik in de onderzoeksthema's van 'Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-Method'. Samen vormen ze een unieke vingerafdruk.

Citeer dit