| commit | bc818b3e6664f08eb29a62734299de4aae759064 | [log] [tgz] |
|---|---|---|
| author | nehamjhanwar <101010093+nehamjhanwar@users.noreply.github.com> | Thu Dec 22 13:19:31 2022 +0530 |
| committer | GitHub <noreply@github.com> | Thu Dec 22 13:19:31 2022 +0530 |
| tree | 0034ffc5f6e96e210769daf92122e2662b8967d8 | |
| parent | 2ad9ea288e312db4e6c149cd59ad5d2062eac79f [diff] |
Delete LICENSE
In cryptography and within embedded security ICs, the PUF is used to create keys that are generated on-demand and instantaneously erased once used. PUF is dependent on random physical factors (unpredictable and uncontrollable) that exist natively and/or are incidentally introduced during a manufacturing process.
Introduction:Arbiter PUFs. utilize the intrinsic timing differences of two symmetrically designed paths to a. single bit of the response at the output of the circuit
fig: Arbiter PUF
working Principle:Arbiter-based Physically Unclonable Function (PUF) is one kind of the delay-based PUFs that use the time difference of two delay-line signals. 