| commit | 005f55024601cb7cf9f9bf40f603fdd3e26a4233 | [log] [tgz] |
|---|---|---|
| author | nehamjhanwar <101010093+nehamjhanwar@users.noreply.github.com> | Thu Dec 22 13:21:28 2022 +0530 |
| committer | GitHub <noreply@github.com> | Thu Dec 22 13:21:28 2022 +0530 |
| tree | c993b7767eb2f022d71e95136245f079418d4dc8 | |
| parent | f3175bdb60299be6ee6892ea373724a792541dd1 [diff] |
Add files via upload
In cryptography and within embedded security ICs, the PUF is used to create keys that are generated on-demand and instantaneously erased once used. PUF is dependent on random physical factors (unpredictable and uncontrollable) that exist natively and/or are incidentally introduced during a manufacturing process.
Introduction:Arbiter PUFs. utilize the intrinsic timing differences of two symmetrically designed paths to a. single bit of the response at the output of the circuit
fig: Arbiter PUF
working Principle:Arbiter-based Physically Unclonable Function (PUF) is one kind of the delay-based PUFs that use the time difference of two delay-line signals. 