Vis enkel innførsel

dc.contributor.authorKusum, Lata
dc.contributor.authorCenkeramaddi, Linga Reddy
dc.date.accessioned2023-11-13T11:32:30Z
dc.date.available2023-11-13T11:32:30Z
dc.date.created2023-11-07T10:22:06Z
dc.date.issued2023
dc.identifier.citationLata. K. & Cenkeramaddi, L. R. (2023). FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis. Cryptography. 7 (4), 55.en_US
dc.identifier.issn2410-387X
dc.identifier.urihttps://hdl.handle.net/11250/3102155
dc.description.abstractField-programmable gate arrays (FPGAs) have firmly established themselves as dynamic platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic reconfigurability and profound implications for enhancing hardware security make them an invaluable asset in this realm. This groundbreaking study not only dives deep into the universe of FPGA-based PUF designs but also offers a comprehensive overview coupled with a discerning comparative analysis. PUFs are the bedrock of device authentication and key generation and the fortification of secure cryptographic protocols. Unleashing the potential of FPGA technology expands the horizons of PUF integration across diverse hardware systems. We set out to understand the fundamental ideas behind PUF and how crucially important it is to current security paradigms. Different FPGA-based PUF solutions, including static, dynamic, and hybrid systems, are closely examined. Each design paradigm is painstakingly examined to reveal its special qualities, functional nuances, and weaknesses. We closely assess a variety of performance metrics, including those related to distinctiveness, reliability, and resilience against hostile threats. We compare various FPGA-based PUF systems against one another to expose their unique advantages and disadvantages. This study provides system designers and security professionals with the crucial information they need to choose the best PUF design for their particular applications. Our paper provides a comprehensive view of the functionality, security capabilities, and prospective applications of FPGA-based PUF systems. The depth of knowledge gained from this research advances the field of hardware security, enabling security practitioners, researchers, and designers to make wise decisions when deciding on and implementing FPGA-based PUF solutions.en_US
dc.language.isoengen_US
dc.publisherMDPIen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleFPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysisen_US
dc.title.alternativeFPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysisen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holder© 2023 The Author(s)en_US
dc.subject.nsiVDP::Teknologi: 500en_US
dc.source.volume7en_US
dc.source.journalCryptographyen_US
dc.source.issue4en_US
dc.identifier.doihttps://doi.org/10.3390/cryptography7040055
dc.identifier.cristin2193060
dc.relation.projectNorges forskningsråd: 287918en_US
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal