| dc.contributor.author | Yu, Meng-Day (Mandel) | |
| dc.contributor.author | Sowell, Richard | |
| dc.contributor.author | Singh, Alok | |
| dc.contributor.author | M’Raihi, David | |
| dc.contributor.author | Devadas, Srinivas | |
| dc.date.accessioned | 2012-09-24T14:44:38Z | |
| dc.date.available | 2012-09-24T14:44:38Z | |
| dc.date.issued | 2012-06 | |
| dc.date.submitted | 2012-06 | |
| dc.identifier.isbn | 978-1-4673-2341-3 | |
| dc.identifier.uri | http://hdl.handle.net/1721.1/73113 | |
| dc.description.abstract | We describe a PUF design with integrated error correction that is robust to various layout implementations and achieves excellent and consistent results in each of the following four areas: Randomness, Uniqueness, Bias and Stability. 133 PUF devices in 0.13 μm technology encompassing seven circuit layout implementations were tested. The PUF-based key generation design achieved less than 0.58 ppm failure rates with 50%+ stability safety margin. 1.75M error correction blocks ran error-free under worst-case V/T corners (±10% V, 125°C/-65°C) and under voltage extremes of ±20% V. All PUF devices demonstrated excellent NIST-random behavior (99 cumulative percentile), a criterion used to qualify random sources for use as keying material for cryptographic-grade applications. | en_US |
| dc.language.iso | en_US | |
| dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
| dc.relation.isversionof | http://dx.doi.org/10.1109/HST.2012.6224329 | en_US |
| dc.rights | Creative Commons Attribution-Noncommercial-Share Alike 3.0 | en_US |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ | en_US |
| dc.source | MIT web domain | en_US |
| dc.title | Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | (Mandel) Yu, Meng-Day et al. “Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC.” IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2012. 108–115. | en_US |
| dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
| dc.contributor.mitauthor | Devadas, Srinivas | |
| dc.relation.journal | Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2012 | en_US |
| dc.eprint.version | Author's final manuscript | en_US |
| dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
| dspace.orderedauthors | (Mandel) Yu, Meng-Day; Sowell, Richard; Singh, Alok; M'Raihi, David; Devadas, Srinivas | en |
| dc.identifier.orcid | https://orcid.org/0000-0001-8253-7714 | |
| mit.license | OPEN_ACCESS_POLICY | en_US |
| mit.metadata.status | Complete | |