专题:Physical Unclonable Functions (PUFs) and Hardware Security

This cluster of papers focuses on hardware security and authentication techniques, including the use of Physical Unclonable Functions (PUFs) for device authentication and key generation, detection and prevention of Hardware Trojans, logic encryption methods, FPGA security, anti-counterfeiting measures, IC reverse engineering, scan-based side-channel attacks, machine learning attacks on hardware, and obfuscation techniques to protect integrated circuits.
最新文献
THE MONOLITHIC AUTONOMIC HARDWARE LICENSE (MARCH 10, 2026)

article Full Text OpenAlex

Short Paper: Toward Practical Post-Quantum Secure Boot: Lessons from Resource-Constrained Deployment

article Full Text OpenAlex

THE AQ-256 DETERMINISTIC ARCHITECTURE

article Full Text OpenAlex

Predictive Augmentation for Anticipatory Cyber Defense: A Unified Framework Integrating Adversarial Machine Learning, Game-Theoretic Autonomous Defense, and Zero-Knowledge Attribution

article Full Text OpenAlex

Bridging the Gap: A Module-Context Modeling Methodology for Hyperscale FPGA Applications

article Full Text OpenAlex

Categorical framework for quantum-resistant zero-trust AI security

article Full Text OpenAlex

On the Thermal Vulnerability of 3D-Stacked High-Bandwidth Memory Architectures

article Full Text OpenAlex

MetaTime One (Phase-1): Preregistered Experimental Protocol and Reference Implementation Skeleton for a PCAM Kernel and an Anchoring Risk Index (ARI) Watchdog

preprint Full Text OpenAlex

A Less than 6.5E-8 BER 36-Way Reconfigurable PUF with 4-bit Stable Responses per Cell Featuring Machine Learning-Based Best-Configuration Selection

article Full Text OpenAlex

AuthenTree: A Scalable MPC-Based Distributed Trust Architecture for Chiplet-Based Heterogeneous Systems

article Full Text OpenAlex

近5年高被引文献
Digital Twins: A Survey on Enabling Technologies, Challenges, Trends and Future Prospects

article Full Text OpenAlex 834 FWCI105.1793

PSCC-Net: Progressive Spatio-Channel Correlation Network for Image Manipulation Detection and Localization

article Full Text OpenAlex 330 FWCI31.0913

Digital Twin: A Comprehensive Survey of Security Threats

article Full Text OpenAlex 293 FWCI37.0674

A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review

review Full Text OpenAlex 285 FWCI57.635

Internet of Things: Security and Solutions Survey

review Full Text OpenAlex 260 FWCI57.4278

Batteryless NFC dosimeter tag for ionizing radiation based on commercial MOSFET

article Full Text OpenAlex 254 FWCI33.6415

PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey

article Full Text OpenAlex 193 FWCI42.3152

State-of-the-Art and Research Opportunities for Next-Generation Consumer Electronics

article Full Text OpenAlex 185 FWCI25.4672

Digital Twin—Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions

article Full Text OpenAlex 179 FWCI23.9227

Big data analytics in Cloud computing: an overview

article Full Text OpenAlex 146 FWCI43.6263