| commit | f3175bdb60299be6ee6892ea373724a792541dd1 | [log] [tgz] |
|---|---|---|
| author | nehamjhanwar <101010093+nehamjhanwar@users.noreply.github.com> | Thu Dec 22 13:20:52 2022 +0530 |
| committer | GitHub <noreply@github.com> | Thu Dec 22 13:20:52 2022 +0530 |
| tree | 4cb7f32b978ebd057b7d14513ec53548786e5878 | |
| parent | 399904c5261bd143fb89ad7afd53c3847b4e8731 [diff] |
Add files via upload
In cryptography and within embedded security ICs, the PUF is used to create keys that are generated on-demand and instantaneously erased once used. PUF is dependent on random physical factors (unpredictable and uncontrollable) that exist natively and/or are incidentally introduced during a manufacturing process.
Introduction:Arbiter PUFs. utilize the intrinsic timing differences of two symmetrically designed paths to a. single bit of the response at the output of the circuit
fig: Arbiter PUF
working Principle:Arbiter-based Physically Unclonable Function (PUF) is one kind of the delay-based PUFs that use the time difference of two delay-line signals. 