Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security
Lead Author: Dr. Meng-Yi Wu, Dr. Kai-Hsin Chuang In a secure chip, the keys, which constitute the hardware root of trust (HRoT) of the chip, must be fully protected. An HRoT is the most important design in chip security, providing fundamental trust (root keys), hardware identification code (UID), hardware unique keys (HUK), and entropy. Consequently, […]
Hardware Security Book Series 2: PUF-based Solutions and Applications
Lead Author: Lawrence Liu A portion of this book is based on the customer document package included in every set of deliverables from PUFsecurity. To make this book more accessible, all technical concepts and terms were examined to determine if they could be further expanded. The goal is to create an easy-to-follow guide for readers […]
Hardware Security Book Series 1: Quantum Tunneling PUF
Lead Author: Dr. Kent, Kai-Hsin Chuang I still remember the first time I heard about Physically Unclonable Function (PUF), it was a complete fascination. Even without thinking deeply about how to use it, the fact that it can turn the undesired device variability into good use is already a shock in the head. After spending […]