Briefly discuss the major characteristic differences between PUFs, TRNGs, and DfACs.
1. Briefly discuss the quality metrics used to evaluate PUFs and TRNGs.
2. Explain why RO-PUFs tend to produce more erroneous responses due to runtime noise and aging compared to traditional arbiter-PUFs.
3. Briefly describe what security primitives (strong PUFs, weak PUFs, or TRNGs) are ideal for following applications:
(a) Chip ID generation.
(b) Authentication.
(c) Licensing.
(d) Cryptographic nonce.
(e) Key-generation for in-situ AES encryption/decryption system.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here