{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:15:34Z","timestamp":1760242534267,"version":"build-2065373602"},"reference-count":12,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in novel hardware-based authentication protocols. Strong PUFs are required for authentication because the bit strings and helper data are transmitted openly by the token to the verifier, and therefore are revealed to the adversary. This enables the adversary to carry out attacks against the token by systematically applying challenges and obtaining responses in an attempt to machine learn, and later predict, the token\u2019s response to an arbitrary challenge. Therefore, strong PUFs must both provide an exponentially large challenge space and be resistant to machine-learning attacks in order to be considered secure. We investigate a transformation called temperature\u2013voltage compensation (TVCOMP), which is used within the Hardware-Embedded Delay PUF (HELP) bit string generation algorithm. TVCOMP increases the diversity and unpredictability of the challenge\u2013response space, and therefore increases resistance to model-building attacks. HELP leverages within-die variations in path delays as a source of random information. TVCOMP is a linear transformation designed specifically for dealing with changes in delay introduced by adverse temperature\u2013voltage (environmental) variations. In this paper, we show that TVCOMP also increases entropy and expands the challenge\u2013response space dramatically.<\/jats:p>","DOI":"10.3390\/cryptography1030017","type":"journal-article","created":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T12:16:23Z","timestamp":1509365783000},"page":"17","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Leveraging Distributions in Physical Unclonable Functions"],"prefix":"10.3390","volume":"1","author":[{"given":"Wenjie","family":"Che","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USA"}]},{"given":"Venkata","family":"Kajuluri","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USA"}]},{"given":"Fareena","family":"Saqib","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida Institute of Technology, Melbourne, FL 32901, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1876-117X","authenticated-orcid":false,"given":"Jim","family":"Plusquellic","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USA"}]}],"member":"1968","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"ref_1","unstructured":"Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A. (1996). Handbook of Applied Cryptography, CRC Press. Available online: http:\/\/cacr.uwaterloo.ca\/hac\/."},{"key":"ref_2","unstructured":"Skorobogatov, S.P. (2005). Semi-Invasive Attacks\u2014A New Approach to Hardware Security Analysis. [Ph.D. Thesis, University of Cambridge]. Technical Report UCAM-CL-TR-630."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., and Devadas, S. (2002, January 18\u201322). Silicon Physical Random Functions. Proceedings of the Computer and Communication Security Conference, Washington, DC, USA.","DOI":"10.1145\/586110.586132"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Aarestad, J., Plusquellic, J., and Acharyya, D. (2013, January 2\u20133). Error-Tolerant Bit Generation Techniques for Use with a Hardware-Embedded Path Delay PUF. Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Austin, TX, USA.","DOI":"10.1109\/HST.2013.6581581"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Che, W., Saqib, F., and Plusquellic, J. (2015, January 2\u20136). PUF-Based Authentication. Proceedings of the IEEE\/ACM International Conference on Computer-Aided Design, Austin, TX, USA.","DOI":"10.1109\/ICCAD.2015.7372589"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Che, W., Martin, M., Pocklassery, G., Kajuluri, V.K., Saqib, F., and Plusquellic, J. (2017). A Privacy-Preserving, Mutual PUF-Based Authentication Protocol. Cryptography, 1.","DOI":"10.3390\/cryptography1010003"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Che, W., Kajuluri, V.K., Martin, M., Saqib, F., and Plusquellic, J. (2017). Analysis of Entropy in a Hardware-Embedded Delay PUF. Cryptography, 1.","DOI":"10.3390\/cryptography1010008"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Van den Berg, R., Skoric, B., and van der Leest, V. (2013, January 4). Bias-based modeling and entropy analysis of PUFs. Proceedings of the 3rd International Workshop on Trustworthy Embedded Devices TrustED\u201913, Berlin, Germany.","DOI":"10.1145\/2517300.2517301"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Kocabas, U., Rozic, V., Sadeghi, A., Verbauwhede, I., and Wachsmann, C. (2012, January 9\u201312). PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon. Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems 2012 (CHES), Leuven, Belgium.","DOI":"10.1007\/978-3-642-33027-8_17"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Ganta, D., and Nazhandali, L. (2013, January 4\u20136). Easy-to-Build Arbiter Physical Unclonable Function with Enhanced Challenge\/Response Set. Proceedings of the International Symposium on Quality Electronic Design, ISQED 2013, Santa Clara, CA, USA.","DOI":"10.1109\/ISQED.2013.6523692"},{"key":"ref_11","unstructured":"(2016, January 05). Advanced Encryption Standard. Available online: https:\/\/en.wikipedia.org\/wiki\/AES."},{"key":"ref_12","unstructured":"Tiri, K., and Verbauwhede, I. (2009, January 2\u20134). A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. Proceedings of the Conference on Design, Automation and Test in Europe, DATE, Seoul, Korea."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/1\/3\/17\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:48:55Z","timestamp":1760208535000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/1\/3\/17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":12,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2017,12]]}},"alternative-id":["cryptography1030017"],"URL":"https:\/\/doi.org\/10.3390\/cryptography1030017","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2017,10,30]]}}}