Projects per year
Abstract
We show that the XORmethod based on linear errorcorrecting codes can be applied to achieve the secretkey capacity of binarysymmetric SRAMPUFs.
Then we focus on multiple keybindings. We prove that no information is leaked by all the helper data about a single secret key both in the case where we use the same key all the time and when we use di↵erent keys. The notion of symmetry is crucial in these proofs.
Then we focus on multiple keybindings. We prove that no information is leaked by all the helper data about a single secret key both in the case where we use the same key all the time and when we use di↵erent keys. The notion of symmetry is crucial in these proofs.
Original language  English 

Title of host publication  Proceedings of the 37th WIC Symposium on Information Theory in the Benelux and the 6th Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux, 2016, May 1920, 2016, Louvain, LouvainlaNeuve, Belgium 
Place of Publication  Leuven 
Publisher  Katholieke Universiteit Leuven 
Pages  120127 
Publication status  Published  2016 
Fingerprint
Dive into the research topics of 'Zeroleakage multiple keybinding scenarios for SRAMPUF systems based on the XORMethod'. Together they form a unique fingerprint.Projects
 1 Finished

PATRIOT Eurostars Pufs: Anchors of Trust in Resource constralned envirOnmenTs
Willems, F. M. J., Kusters, C. J. (., Keijzers, A., Keijzers, A., Croes, S., Willems, F. M. J., Sanders, R., Alvarado, A. & Chen, B.
1/10/15 → 30/09/17
Project: Research direct