| commit | bee5b20db36f6af832c7f45fcbcac24fdaef9ca1 | [log] [tgz] |
|---|---|---|
| author | nehamjhanwar <101010093+nehamjhanwar@users.noreply.github.com> | Thu Dec 22 11:23:45 2022 +0530 |
| committer | GitHub <noreply@github.com> | Thu Dec 22 11:23:45 2022 +0530 |
| tree | fdb536b55e5617a5cb3b37a9bd3d24c045cefbfb | |
| parent | 68e2520c609c531ad38acc5dd4f04963cbd77edc [diff] |
Add files via upload
In cryptography and within embedded security ICs, the PUF is used to create keys that are generated on-demand and instantaneously erased once used. PUF is dependent on random physical factors (unpredictable and uncontrollable) that exist natively and/or are incidentally introduced during a manufacturing process.
Introduction:Arbiter PUFs. utilize the intrinsic timing differences of two symmetrically designed paths to a. single bit of the response at the output of the circuit
fig: Arbiter PUF
working Principle:Arbiter-based Physically Unclonable Function (PUF) is one kind of the delay-based PUFs that use the time difference of two delay-line signals. 