FPGA PUF Based on Programmable LUT Delays
|
|
- Garey Lewis
- 5 years ago
- Views:
Transcription
1 FPGA PUF Based on Programmable LUT Delays Bilal Habib Kris Gaj Jens-Peter Kaps Cryptographic Engineering Research Group (CERG) Department of ECE, Volgenau School of Engineering, George Mason University, Fairfax, VA, USA 16th Euromicro Conference on Digital System Design 2013 DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 1 / 20
2 Outline Introduction 1 Introduction DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 2 / 20
3 What is a Physical Unclonable Function Properties of PUFs Typical Ring-Oscillator (RO) PUF What is a Physical Unclonable Function (PUF) Challenge m bits PUF Response n bits n = f (m), nonlinear, unpredictable, one-way function. f is based on manufacturing variations unique for each chip. Tamper resistant: There is no secret that can be extracted. PUF produces a fingerprint for each chip. DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 3 / 20
4 What is a Physical Unclonable Function Properties of PUFs Typical Ring-Oscillator (RO) PUF What is a Physical Unclonable Function (PUF) Challenge m bits PUF Response n bits n = f (m), nonlinear, unpredictable, one-way function. f is based on manufacturing variations unique for each chip. Tamper resistant: There is no secret that can be extracted. PUF produces a fingerprint for each chip. Applications Chip identification Secret key generation IP Protection on FPGAs DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 3 / 20
5 Properties of PUFs Introduction What is a Physical Unclonable Function Properties of PUFs Typical Ring-Oscillator (RO) PUF Uniformity Percentage of 1 s in response (ideal: 50%) Uniqueness Inter-chip difference of responses (ideal: 100%) Bit-aliasing Number of bits different between 2 responses of different chips (ideal: 50%) Reliability Intra-chip similarity of responses (ideal: 100%) Steadiness Number of response bits that remain the same between responses to the same challenge (ideal: 100%) DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 4 / 20
6 Typical Ring-Oscillator (RO) PUF What is a Physical Unclonable Function Properties of PUFs Typical Ring-Oscillator (RO) PUF RO 1 RO 2 RO N MUX i MUX j 1 0 N 1 0 N counter counter >? Q challenge RO frequency difference depends on manufacturing variations. Output is 1 if frequency of RO i > frequency RO j. Routing from ROs to MUX does not need to be symmetrical. RO pairs with large frequency difference are less susceptible to noise. Potential Problems: Expensive in terms of Area, 1 bit per comparison Systematic variation DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 5 / 20
7 Programmable Ring Oscillators Programmable ROs Programmable RO PUF Layout Experimental Setup en Basic RO consists of 3 inverters and 1 AND gate. DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 6 / 20
8 Programmable Ring Oscillators Programmable ROs Programmable RO PUF Layout Experimental Setup Slice X1Y1 Slice X0Y0 Slice X0Y1 Slice X1Y0 en LUT LUT LUT LUT CLB Basic RO consists of 3 inverters and 1 AND gate. Using only 1 LUT per slice, 1 RO per CLB. DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 6 / 20
9 Programmable Ring Oscillators Programmable ROs Programmable RO PUF Layout Experimental Setup Slice X1Y1 Slice X0Y0 Slice X0Y1 Slice X1Y0 en 2 LUT 3 LUT 3 LUT 3 LUT CLB configuration Basic RO consists of 3 inverters and 1 AND gate. Using only 1 LUT per slice, 1 RO per CLB. Remaining 3 LUT inputs for configurations 8 configurations 8 frequencies per RO. DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 6 / 20
10 Programmable RO PUF Programmable ROs Programmable RO PUF Layout Experimental Setup new RO0 new RO1 1 0 RO counter en Control new ROr 1 M en Std counter 50 MHz log M 2 3 Only one RO active at a time they can t influence each other. To avoid correlations, only RO 0 RO 1, RO 1 RO 2,..., RO (r 2) RO (r 1) are compared. DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 7 / 20
11 FPGA Layout Introduction Programmable ROs Programmable RO PUF Layout Experimental Setup Device: Xilinx Spartan 3e, XC3S100. PUF with M=130 Ring Oscillators (13x10). Comparing M-1 rings Total bits = R128 R129 R0 DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 8 / 20
12 Logical Layout Introduction Programmable ROs Programmable RO PUF Layout Experimental Setup Comparison along the columns: P1 DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 9 / 20
13 Logical Layout Introduction Programmable ROs Programmable RO PUF Layout Experimental Setup Comparison along the columns: P1 Comparison along the rows: P2 DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 9 / 20
14 Experimental Setup Programmable ROs Programmable RO PUF Layout Experimental Setup 31 x Digilent Inc. Basys 2 Board. 130 ROs per PUF. 8 configurations per RO. Connected via USB to PC. Using Enhanced Parallel Port (EPP) protocol with Digilent Adept. Determined frequency of each configuration of each RO on each Chip. DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 10 / 20
15 Frequency Analysis Introduction Frequency Analysis Generating IDs Average board frequency = 165 MHz Standard Deviation amongst ROs and configurations for each board = 1.5 MHz DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 11 / 20
16 Frequency vs. RO Location Frequency Analysis Generating IDs Average Frequency of each RO in all configurations over 31 boards. DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 12 / 20
17 Random Within Die Variation Frequency Analysis Generating IDs Random with-in-die variation. Down Sample Moving Average (DSMA) with a 3x3 window. Normalized over F(0,0). DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 13 / 20
18 Random Within Die Variation Frequency Analysis Generating IDs Randomness Distribution Mean 0.0 Min % Max 2.27 % Peak to Peak 5.5% Standard Deviation 0.84% DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 14 / 20
19 Generating IDs - Crossover Frequency Analysis Generating IDs Frequencies of two neighboring ROs can cross. Response here is Not all RO pairs have a crossover. DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 15 / 20
20 Generating IDs Introduction Frequency Analysis Generating IDs Pseudo-code for ID Generation 1: if crossover then 2: if f > 150 MHz then {Thresholding Technique} 3: Contribute 8 bits towards an ID 4: end if 5: else 6: Determine 1 bit response by majority vote 7: end if Average Std. Deviation = 30 khz among 20 samples. Reliability requires no bit-flips. After applying Thresholding Technique a minimum of 283 strong bits remain amongst our PUFs on all 31 boards. DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 16 / 20
21 Results Introduction Result Comparison Conclusion and Future Work Slices % of total ROs 4x130= % Other Logic % Total % Ideal P1 P2 Uniformity 50 % 50.1 % 50.7 % Uniqueness 100 % 96.6 % 95.3 % Bit-aliasing 50 % 51.8 % 50.7 % Reliability 100 % 97.8 % 98.1 % Steadiness 100 % 99.5 % 99.5 % DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 17 / 20
22 Result Comparison Introduction Result Comparison Conclusion and Future Work Ideal P1 P2 Maiti Uniformity 50 % 50.1 % 50.7 % 50.5 % Uniqueness 100 % 96.6 % 95.3 % 93.9 % Bit-aliasing 50 % 51.8 % 50.7 % 50.5 % Reliability 100 % 97.8 % 98.1 % 99.1 % Steadiness 100 % 99.5 % 99.5 % 98.9 % DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 18 / 20
23 Result Comparison Introduction Result Comparison Conclusion and Future Work Ideal P1 P2 Maiti Uniformity 50 % 50.1 % 50.7 % 50.5 % Uniqueness 100 % 96.6 % 95.3 % 93.9 % Bit-aliasing 50 % 51.8 % 50.7 % 50.5 % Reliability 100 % 97.8 % 98.1 % 99.1 % Steadiness 100 % 99.5 % 99.5 % 98.9 % P1 P2 Maiti No. of Chips No. of Ring Oscillators Strong Response Bits Bits per Ring FPGA Device Spartan 3e Spartan 3e (XC3S100E) (XC3S500E) DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 18 / 20
24 Conclusion and Future Work Result Comparison Conclusion and Future Work Conclusions Programmable delays improve an RO PUF. Generate more than one stable random bit per RO on average. Systematic variation is canceled out. Locking of ROs is avoided. Compares well with state of the art RO PUF yet requires much less area. Future Work Subject our RO PUF to temperature and voltage variations. Analyze our PUF on newer devices. DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 19 / 20
25 Questions Introduction Result Comparison Conclusion and Future Work DSD 2013 B. Habib, K. Gaj, J.-P. Kaps FPGA PUF based on Programmable LUT Delays 20 / 20
Physical Unclonable Functions (PUFs) and Secure Processors. Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology
Physical Unclonable Functions (PUFs) and Secure Processors Srini Devadas Department of EECS and CSAIL Massachusetts Institute of Technology 1 Security Challenges How to securely authenticate devices at
More informationIMPROVING THE QUALITY OF A PHYSICAL UNCLONABLE FUNCTION USING CONFIGURABLE RING OSCILLATORS Abhranil Maiti, Patrick Schaumont
IMPROVING THE QUALITY OF A PHYSICAL UNCLONABLE FUNCTION USING CONFIGURABLE RING OSCILLATORS Abhranil Maiti, Patrick Schaumont Electrical and Computer Engineering Department Virginia Tech Blacksburg, VA
More informationMoving PUFs out of the lab
Moving PUFs out of the lab Patrick Schaumont 2/3/2012 Research results by Abhranil Maiti, Jeff Casarona, Luke McHale, Logan McDougall, Vikash Gunreddy, Michael Cantrell What is a Physical Unclonable Function?
More informationwww.unique-project.eu Exchange of security-critical data Computing Device generates, stores and processes security-critical information Computing Device 2 However: Cryptographic secrets can be leaked by
More informationSoft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs
Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs Chen Zhou, SarojSatapathy, YingjieLao, KeshabK. Parhiand Chris H. Kim Department of ECE University of Minnesota
More informationPUF RO (RING OSCILLATOR)
PUF RO (RING OSCILLATOR) EEC 492/592, CIS 493 Hands-on Experience on Computer System Security Chan Yu Cleveland State University CIRCUIT PUF - PREVIOUS WORK Ravikanth et. al proposed the first PUF in literature
More informationSecure and Energy Efficient Physical Unclonable Functions
University of Massachusetts Amherst ScholarWorks@UMass Amherst Masters Theses 1911 - February 2014 Dissertations and Theses 2012 Secure and Energy Efficient Physical Unclonable Functions Sudheendra Srivathsa
More informationEmploying Process Variation for Building Chip Identifiers
Turning Lemons into Lemonade: Employing Process Variation for Building Chip Identifiers Leyla Nazhandali, Electrical and Computer Eng. Department Virginia Tech Outline Part 1: What are PUFs? Identity of
More informationVariation Aware Placement for Efficient Key Generation using Physically Unclonable Functions in Reconfigurable Systems
University of Massachusetts Amherst ScholarWorks@UMass Amherst Masters Theses Dissertations and Theses 2016 Variation Aware Placement for Efficient Key Generation using Physically Unclonable Functions
More informationSPARKS Smart Grids Week Stakeholder Workshop
SPARKS Smart Grids Week Stakeholder Workshop Smart meter (gateway) authentication and key management using hardware PUFs Physical structures are unique every physical object is unique, has a specific fingerprint
More informationA Physical Unclonable Function based on Capacitor Mismatch in a Charge-Redistribution SAR-ADC
A Physical Unclonable Function based on Capacitor Mismatch in a Charge-Redistribution SAR-ADC Qianying Tang, Won Ho Choi, Luke Everson, Keshab K. Parhi and Chris H. Kim University of Minnesota Department
More informationSecurity Evaluation and Enhancement of Bistable Ring PUFs
ecurity Evaluation and Enhancement of Bistable ing PUFs FIDec, June 23, 25 Xiaolin Xu (), Ulrich ührmair (2) Daniel Holcomb () and Wayne Burleson () () UMass Amherst (2) HGI, U Bochum This material is
More informationA DRAM based Physical Unclonable Function Capable of Generating >10 32 Challenge Response Pairs per 1Kbit Array for Secure Chip Authentication
A DRAM based Physical Unclonable Function Capable of Generating >10 32 Challenge Response Pairs per 1Kbit Array for Secure Chip Authentication Q. Tang, C. Zhou, *W. Choi, *G. Kang, *J. Park, K. K. Parhi,
More informationMicroprocessor Based Physical Unclonable Function
Microprocessor Based Physical Unclonable Function Sudeendra kumar K, Sauvagya Sahoo, Abhishek Mahapatra, Ayas Kanta Swain, K.K.Mahapatra kumar.sudeendra@gmail.com, sauvagya.nitrkl@gmail.com, kmaha2@gmail.com
More informationA PUF Design for Secure FPGA-Based Embedded Systems
A PUF Design for Secure FPGA-Based Embedded Systems author line author line2 author line3 Abstract The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application
More informationNovel Reconfigurable Silicon Physical Unclonable Functions
Novel Reconfigurable Silicon Physical Unclonable Functions Yingjie Lao and Keshab K. Parhi epartment of Electrical and Computer Engineering, University of Minnesota, Twin Cities {laoxx25, parhi}@umn.edu
More informationUltra-lightweight and Reconfigurable Tristate Inverter Based Physical Unclonable Function Design
Ultra-lightweight and Reconfigurable Inverter Based Physical Unclonable Function Design Cui, Y., Gu, C., Wang, C., O'Neill, M., & Liu, W. (2018). Ultra-lightweight and Reconfigurable Inverter Based Physical
More informationDopingless Transistor based Hybrid Oscillator Arbiter Physical Unclonable Function
Dopingless Transistor based Hybrid Oscillator Arbiter Physical Unclonable Function V. P. Yanambaka 1, S. P. Mohanty 2, E. Kougianos 3, P. Sundaravadivel 4 and J. Singh 5 NanoSystem Design Laboratory (NSDL,
More informationA PUF Design for Secure FPGA-Based Embedded Systems
A PUF Design for Secure FPGA-Based Embedded Systems Jason H. Anderson Department of Electrical and Computer Engineering University of Toronto Toronto, Ontario, Canada e-mail: janders@eecg.toronto.edu Abstract
More informationActive and Passive Side-Channel Attacks on Delay Based PUF Designs
1 Active and Passive Side-Channel Attacks on Delay Based PUF Designs Georg T. Becker, Raghavan Kumar Abstract Physical Unclonable Functions (PUFs) have emerged as a lightweight alternative to traditional
More informationPhysically Unclonable Functions: a Study on the State of the Art and Future Research Directions.
Physically Unclonable Functions: a Study on the State of the Art and Future Research Directions. Roel Maes, Ingrid Verbauwhede 1 Introduction The idea of using intrinsic random physical features to identify
More informationBitline PUF:! Building Native Challenge-Response PUF Capability into Any SRAM. Daniel E. Holcomb Kevin Fu University of Michigan
Sept 26, 24 Cryptographic Hardware and Embedded Systems Bitline PUF:! Building Native Challenge-Response PUF Capability into Any SRAM Daniel E. Holcomb Kevin Fu University of Michigan Acknowledgment: This
More informationProcessor-Based Strong Physical Unclonable Functions with Aging-Based Response Tuning
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, VOL. X, NO. X, DECEMBER 213 1 Processor-Based Strong Physical Unclonable Functions with Aging-Based Response Tuning Joonho Kong, Member, IEEE, and Farinaz
More informationPhysical Unclonable Functions and Applications: A Tutorial
INVITED PAPER Physical Unclonable Functions and Applications: A Tutorial This paper is a tutorial on ongoing work in physical-disorder-based security, security analysis, and implementation choices. By
More informationAFRL-RI-RS-TR
AFRL-RI-RS-TR-2014-018 IC PIRACY PROTECTION BY APUF AND LOGIC OBFUSCATION RICE UNIVERSITY JANUARY 2014 FINAL TECHNICAL REPORT STINFO COPY AIR FORCE RESEARCH LABORATORY INFORMATION DIRECTORATE AIR FORCE
More informationPUF Design - User Interface
PUF Design - User Interface September 27, 2011 1 Introduction Design an efficient Physical Unclonable Functions (PUF): PUFs are low-cost security primitives required to protect intellectual properties
More informationSoft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs
Soft esponse Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs Chen Zhou, Saroj Satapathy, Yingjie Lao, Keshab K. Parhi and Chris H. Kim Department of ECE, University of Minnesota,
More informationREPORT DOCUMENTATION PAGE
REPORT DOCUMENTATION PAGE Form Approved OMB No. 74-88 The public reporting burden for this collection of information is estimated to average hour per response, including the time for reviewing instructions,
More informationEE115C Spring 2013 Digital Electronic Circuits. Lecture 19: Timing Analysis
EE115C Spring 2013 Digital Electronic Circuits Lecture 19: Timing Analysis Outline Timing parameters Clock nonidealities (skew and jitter) Impact of Clk skew on timing Impact of Clk jitter on timing Flip-flop-
More informationA Heuristic Method for Statistical Digital Circuit Sizing
A Heuristic Method for Statistical Digital Circuit Sizing Stephen Boyd Seung-Jean Kim Dinesh Patil Mark Horowitz Microlithography 06 2/23/06 Statistical variation in digital circuits growing in importance
More informationReverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels
Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels Sheng Wei * James B. Wendt * Ani Nahapetian * Miodrag Potkonjak * * University of California, Los Angeles
More informationExample. Security of Bistable Ring PUF
Example Challenge bits select weights, stage index determines signs Response tells whether sum is negative or positive Additive delay model (like Arbiter PUF) t 0 b 1 + t 2 t 3 + b 4 b 5 + t 6 t 7 1 0
More informationThe DRAM Latency PUF:
The DRAM Latency PUF: Quickly Evaluating Physical Unclonable Functions by Exploiting the Latency-Reliability Tradeoff in Modern Commodity DRAM Devices Jeremie S. Kim Minesh Patel Hasan Hassan Onur Mutlu
More informationHigh Reliability PUF using Hot-Carrier Injection Based Response Reinforcement
High Reliability PUF using Hot-Carrier Injection Based Response Reinforcement Mudit Bhargava and Ken Mai Electrical and Computer Engineering Carnegie Mellon University CHES 2013 Key Generation using PUFs
More informationStatistical Static Timing Analysis: How simple can we get?
Statistical Static Timing Analysis: How simple can we get? Chirayu Amin, Noel Menezes *, Kip Killpack *, Florentin Dartu *, Umakanta Choudhury *, Nagib Hakim *, Yehea Ismail ECE Department Northwestern
More informationHigh throughput implementation of the new Secure Hash Algorithm through partial unrolling
High throughput implementation of the new Secure Hash Algorithm through partial unrolling Konstantinos Aisopos Athanasios P. Kakarountas Haralambos Michail Costas E. Goutis Dpt. of Electrical and Computer
More informationReliable and efficient PUF-based key generation using pattern matching
Reliable and efficient PUF-based key generation using pattern matching The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As
More informationReconfigurable Acceleration for Monte Carlo based Financial Simulation
Reconfigurable Acceleration for Monte Carlo based Financial Simulation G.L. Zhang, P.H.W. Leong, C.H. Ho, K.H. Tsoi, C.C.C. Cheung*, D. Lee**, Ray C.C. Cheung*** and W. Luk*** The Chinese University of
More informationAdapting Voltage Ramp-up Time for Temperature Noise Reduction on Memory-based PUFs
Adapting Voltage Ramp-up Time for Temperature Noise Reduction on Memory-based PUFs Mafalda Cortez Said Hamdioui Delft University of Technology Faculty of EE, Mathematics and CS Mekelweg 4, 2628 CD Delft,
More informationHow to Generate Repeatable Keys Using Physical Unclonable Functions
Noname manuscript No. (will be inserted by the editor) How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search Nathan
More informationPerformance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC
Performance Metrics and Empirical Results of a PUF Cryptographic Key Generation ASIC The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters.
More informationDesign of a Financial Application Driven Multivariate Gaussian Random Number Generator for an FPGA
Design of a Financial Application Driven Multivariate Gaussian Random Number Generator for an FPGA Chalermpol Saiprasert, Christos-Savvas Bouganis and George A. Constantinides Department of Electrical
More informationRobust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching
Received 10 May 2013; revised 9 October 2013; accepted 22 December 2013. Date of publication xx xxx xxxx; date of current version xx xxx xxxx. Digital Object Identifier 10.1109/TETC.2014.2300635 Robust
More informationPractice 10: Ratioed Logic
Practice 0: Ratioed Logic Digital Electronic Circuits Semester A 0 Ratioed vs. Non-Ratioed Standard CMOS is a non-ratioed logic family, because: The logic function will be correctly implemented regardless
More informationRecommended Land Pattern: [mm]
Dimensions: [mm] Recommended Land Pattern: [mm] Electrical Properties: Properties Test conditions Value Unit Tol. 3 Inductance 10 khz/ 0.1 ma L. mh ±30% 1 4 Rated Current @ 70 C I R.75 A max. DC Resistance
More informationRobust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching
.9/TETC.24.23635, IEEE Transactions on Emerging Topics in Computing Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching Masoud Rostami, Mehrdad Majzoobi,
More informationStat 101 Exam 1 - Embers Important Formulas and Concepts 1
1 Chapter 1 1.1 Definitions Stat 101 Exam 1 - Embers Important Formulas and Concepts 1 1. Data Any collection of numbers, characters, images, or other items that provide information about something. 2.
More information8508A Reference Multimeter Extended Specifications
8508A Reference Multimeter Extended Specifications General Specifications Specifications Power Voltage 115 V Setting...100 V to 10 V rms designed for additional voltage fluctuations 10 %. 30 V Setting...00
More informationCombining Differential Privacy and Secure Multiparty Computation
Combining Differential Privacy and Secure Multiparty Computation Martin Pettai, Peeter Laud {martin.pettai peeter.laud}@cyber.ee December 11th, 2015 Introduction Problem Institutions have data about individuals
More informationFEATURES APPLICATIONS ± [5.18 ± 0.254] [3.0] Max.
IHP-CZ- IHP Commercial Inductors, High Saturation Series DESIGN SUPPORT TOOS click logo to get started Models Available STANDARD EECTRICA SPECIFICATIONS INDUCTANCE ± % AT khz,.5 V, A (μh) Design Tools
More informationRealization of MUX-Based PUF for low power applications
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 6, Ver. IV (Nov.-Dec.2016), PP 33-43 www.iosrjournals.org Realization of MUX-Based
More informationSRAM-based Physical Unclonable Functions
Feb 26, 25 @ Worcester Polytechnic Institute SRAM-based Physical Unclonable Functions Daniel E. Holcomb UMass Amherst Collaborators for these works: Wayne P Burleson Kevin Fu Amir Rahmati Uli Ruhrmair
More informationQML35. Cover. Voltage A = 5V (+/- 5%) B = 3.3V (+/- 5%)
QML35 DESIGN FEATURES Bearingless modular design Low profile assembled height Resolutions up to 8192 lines per revolution 4, 6, 8 or 10 pole commutation Easy lock-n-twist assembly feature Through shaft
More informationCosting and Budgeting. From cost to value: methods and techniques to set the right cost to software
Costing and Budgeting From cost to value: methods and techniques to set the right cost to software Goals of the Unit Questions you might face: How much does the development of the software cost? Is the
More informationPower Quality Report - EN 50160
200 0 Power Quality Report - EN 50160 Report Report number: 26/2014 Start date: 24.06.2014 End date: 28.06.2014 : Failed Status: Not complete Monitoring time: 16:30:00 Evaluation: All deviations Flicker
More informationThe PUF Promise (Short Paper)
The PUF Promise (Short Paper) Heike Busch 1, Miroslava Sotáková 2, Stefan Katzenbeisser 1, and Radu Sion 2 1 Technische Universität Darmstadt 2 Stony Brook University Abstract. Physical Uncloneable Functions
More informationSimulation. Decision Models
Lecture 9 Decision Models Decision Models: Lecture 9 2 Simulation What is Monte Carlo simulation? A model that mimics the behavior of a (stochastic) system Mathematically described the system using a set
More informationDriving egan FETs in High Performance Power Conversion Systems
The egan FET Journey Continues Driving egan FETs in High Performance Power Conversion Systems Alexander Lidow PhD Efficient Power Conversion Corporation EPC - The Leader in egan FETs ECS 2011 www.epc-co.com
More informationEfficient Power Conversion Corporation
The egan FET Journey Continues Using egan FETs for Envelope Tracking Buck Converters Johan Strydom Efficient Power Conversion Corporation EPC - The Leader in egan FETs PELS 2014 www.epc-co.com 1 Agenda
More information5/17/2009. Designing a Spreadsheet. The Trip. Design Guidelines. Chapter 15: "What if" Thinking Helps: Advanced Spreadsheets for Planning
Chapter 15: "What if" Thinking Helps: Advanced Spreadsheets for Planning Designing a Spreadsheet Fluency with Information Technology Third Edition by Lawrence Snyder When a spreadsheet is used repeatedly,
More informationColor Pay : Next Paradigm for Instant Payment
Color Pay : Next Paradigm for Instant Payment Table of Contents Table of Contents 2 Abstract 2 What is PUF? 3 Overview of PUF 3 Architecture of PUF Chip 3 Internals of PUF Chip 4 External Interfaces of
More informationEmpirical Asset Pricing for Tactical Asset Allocation
Introduction Process Model Conclusion Department of Finance The University of Connecticut School of Business stephen.r.rush@gmail.com May 10, 2012 Background Portfolio Managers Want to justify fees with
More informationLow Profile, High Current IHLP Inductors
IHP-CZ- ow Profile, High Current IHP Inductors Manufactured under one or more of the following: US Patents; 6,9,75/6,,7/6,9,9/6,6,. Several foreign patents, and other patents pending. STANDARD EECTRICA
More informationFEATURES. IHLP-2525CZ μh ± 20 % ER e3 MODEL INDUCTANCE VALUE INDUCTANCE TOLERANCE PACKAGE CODE JEDEC LEAD (Pb)-FREE STANDARD
IHP-CZ- IHP Commercial Inductors, High Temperature ( C) Series DESIGN SUPPORT TOOS click logo to get started Models Available STANDARD EECTRICA SPECIFICATIONS INDUCTANCE ± % AT khz,. V, A (μh) Design Tools
More informationPHYSICAL UNCLONABLE FUNCTION HARDWARE KEYS UTILIZING KIRCHHOFF-LAW-JOHNSON-NOISE SECURE KEY EXCHANGE AND NOISE-BASED LOGIC
Fluctuation and Noise Letters Vol. 12, No. 3 (2013) 1350018 (11 pages) c World Scientific Publishing Company DOI: 10.1142/S0219477513500181 PHYSICAL UNCLONABLE FUNCTION HARDWARE KEYS UTILIZING KIRCHHOFF-LAW-JOHNSON-NOISE
More information3.6V / 2600mAh Primary Lithium x 0.85 (60mm x 21mm) 1.0 oz (28 gr) -30 C to +77 C. Bluetooth Low Energy dBm. +5dBm. 1Mbit/s / 2Mbit/s*
SPECIFICATION SHEET BEEKs Industrial VER 1.6 HARDWARE SPECIFICATION Battery Size Weight Temperature Range Bluetooth Type Bluetooth Sensitivity Bluetooth Max Power Output Bluetooth Antenna Frequency Supported
More informationUnconditional UC-Secure Computation with (Stronger-Malicious) PUFs
Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs Saikrishna Badrinarayanan Dakshita Khurana Rafail Ostrovsky Ivan Visconti Abstract Brzuska et. al. (Crypto 2011) proved that unconditional
More informationFEATURES APPLICATIONS. SRF TYP. (MHz) ± [5.18 ± 0.254] [2.0] Max.
IHP-BZ-11 IHP Commercial Inductors, ow DCR Series DESIGN SUPPORT TOOS click logo to get started Models Available STANDARD EECTRICA SPECIFICATIONS INDUCTANCE ± % AT khz,.5 V, A (μh) Design Tools Available
More informationSPSS t tests (and NP Equivalent)
SPSS t tests (and NP Equivalent) Descriptive Statistics To get all the descriptive statistics you need: Analyze > Descriptive Statistics>Explore. Enter the IV into the Factor list and the DV into the Dependent
More informationLightweight and Secure PUF Key Storage Using Limits of Machine Learning
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning Meng-Day (Mandel) Yu 1, David M Raihi 1, Richard Sowell 1, and Srinivas Devadas 2 1 Verayo Inc., San Jose, CA, USA {myu,david,rsowell}@verayo.com
More informationMonolithic Amplifier CMA-162LN+ Ultra Low Noise, High IP to 1.6 GHz
Ultra Low Noise, High IP3 Monolithic Amplifier 50Ω 0.7 to 1.6 GHz The Big Deal Ceramic, Hermetically Sealed, Nitrogen filled Low profile case,.045 high Ultra Low Noise Figure, 0.5 db High Gain, High IP3
More informationSOLUTIONS TO THE LAB 1 ASSIGNMENT
SOLUTIONS TO THE LAB 1 ASSIGNMENT Question 1 Excel produces the following histogram of pull strengths for the 100 resistors: 2 20 Histogram of Pull Strengths (lb) Frequency 1 10 0 9 61 63 6 67 69 71 73
More informationPUF-Based UC-Secure Commitment without Fuzzy Extractor
PUF-Based UC-Secure Commitment without Fuzzy Extractor Huanzhong Huang Department of Computer Science, Brown University Joint work with Feng-Hao Liu Advisor: Anna Lysyanskaya May 1, 2013 Abstract Cryptographic
More informationBLF7G20L-160P; BLF7G20LS-160P
BLF7G20L-160P; BLF7G20LS-160P Rev. 01 22 June 2010 Objective data sheet 1. Product profile 1.1 General description 160 W LDMOS power transistor for base station applications at frequencies from 1800 MHz
More informationType 778P/779P, Orange Drop, Polypropylene Film/Foil Capacitors
Type 778P/779P Orange Drop 400 Volts A-C Polypropylene Film/Foil Capacitors Features Specifically designed for A-C voltage applications where corona free operation is required for high reliability. Extremely
More informationRRAM-based PUF: Design and Applications in Cryptography. Ayush Shrivastava
RRAM-based PUF: Design and Applications in Cryptography by Ayush Shrivastava A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Science Approved July 2015 by the Graduate
More informationAnalytics in 10 Micro-Seconds Using FPGAs. David B. Thomas Imperial College London
Analytics in 10 Micro-Seconds Using FPGAs David B. Thomas dt10@imperial.ac.uk Imperial College London Overview 1. The case for low-latency computation 2. Quasi-Random Monte-Carlo in 10us 3. Binomial Trees
More informationProgrammable Hash Functions and their applications
Programmable Hash Functions and their applications Dennis Hofheinz, Eike Kiltz CWI, Amsterdam Leiden - June 2008 Programmable Hash Functions 1 Overview 1. Hash functions 2. Programmable hash functions
More informationBAS70-00-V to BAS70-06-V
Small Signal Schottky Diodes, Single & Dual Features These diodes feature very low turn-on voltage and fast switching These devices are protected by a PN junction guard ring against excessive voltage,
More informationSCEPTRE TRADING A COURSE IN DAY AND SWING TRADING
SCEPTRE TRADING A COURSE IN DAY AND SWING TRADING STOCK PRICE CHARACTERISTICS AND TRADING TECHNIQUES INTRODUCTION Overview of where we re going this week during the course Why use technical analysis to
More informationQM35. Cover. Output. A = Line Driver B = Line Driver (ABZ) /Open Collector (UVW) C = Dual Votage Line Driver (ABZ)/ Open Collector (UVW)
QM35 DESIGN FEATURES Bearingless modular design Low profile assembled height Resolutions up to 8192 lines per revolution 4, 6, 8 or 10 pole commutation Easy lock-n-twist assembly feature Through shaft
More informationVAC, 50/60 Hz. -25 C to 65 C. Bluetooth Low Energy dBm. +5dBm. 1Mbit/s (2Mbit/s) 128 bit AES b/g/n
SPECIFICATION SHEET BLUFI VER 1.3 HARDWARE SPECIFICATION AC Input AC Plugs 100-240 VAC, 50/60 Hz US type: NEMA 1-15 ungrounded (Type A) European: CEE 7/16 "Europlug" (Type C) British Standard BS 1363 (Type
More informationApplied Behavior Analysis Technician (ABAT ) Pass Point Study Data Analysis Report
Applied Behavior Analysis Technician (ABAT ) Pass Point Study Data Analysis Report Tina Freilicher, Ph.D., Shoreline Psychometric Services, LLC. NOTE: This report describes the analysis of data collected
More information0.400 ± [ ± 0.127] [4.0] max ± [ ± 0.127] [3.251]
IHP Commercial Inductors, ow DCR Series IHP-DZ-11 DESIGN SUPPORT TOOS Models Available Design Tools Available STANDARD EECTRICA SPECIFICATIONS INDUCTANCE ± % AT khz,.5 V, A (μh) DCR TYP. 5 C (m ) DCR MAX.
More informationCase Material: Molded Plastic. UL Flammability Classification Low Reverse Leakage Current
Pb 4A GLASS PASSIVATED BRIDGE RECTIFIER Features Mechanical Data Glass Passivated Die Construction Case: Rating to 1,000V PRV Case Material: Molded Plastic. UL Flammability Classification Low Reverse Leakage
More informationGenetic Algorithm-based Electromagnetic Fault Injection
Genetic Algorithm-based Electromagnetic Fault Injection Antun Maldini Niels Samwel Stjepan Picek Lejla Batina Institute for Computing and Information Sciences Digital Security FDTC 2018 2018-09-13 Antun
More informationApplication-Based Performance and Power Analysis on Dynamically Reconfigurable Processor
223 8522 3-4- E-mail: drp@am.ics.keio.ac.jp NEC Dynamically Reconfigurable Processor (DRP) DRP, Abstract Application-Based Performance and Power Analysis on Dynamically Reconfigurable Processor Yohei HASEGAWA,
More informationStock Trading Following Stock Price Index Movement Classification Using Machine Learning Techniques
Stock Trading Following Stock Price Index Movement Classification Using Machine Learning Techniques 6.1 Introduction Trading in stock market is one of the most popular channels of financial investments.
More informationarxiv: v1 [cs.cr] 26 Jan 2015
A new Definition and Classification of Physical Unclonable Functions arxiv:1501.06363v1 [cs.cr] 26 Jan 2015 ABSTRACT Rainer Plaga Federal Office for Information Security (BSI) Godesberger Allee 185-189
More informationAccelerating Financial Computation
Accelerating Financial Computation Wayne Luk Department of Computing Imperial College London HPC Finance Conference and Training Event Computational Methods and Technologies for Finance 13 May 2013 1 Accelerated
More informationBinomial and Normal Distributions
Binomial and Normal Distributions Bernoulli Trials A Bernoulli trial is a random experiment with 2 special properties: The result of a Bernoulli trial is binary. Examples: Heads vs. Tails, Healthy vs.
More informationDCR DCR. Irms (A) Isat (A) Typ. Max. Recommended Layout NATURAL COOLING
*RoHS COMPLIANT & AEC APPROVED R7 Features Shielded construction Carbonyl powder core High saturation current Low profile - 1. mm Inductance range:. to µh AEC-Q qualified RoHS compliant* and halogen free**
More informationLow Profile, High Current IHLP Inductors
IHP-BZ-11 ow Profile, High Current IHP Inductors Manufactured under one or more of the following: US Patents; 6,19,375/6,,7/6,9,9/6,,. Several foreign patents, and other patents pending. STANDARD EECTRICA
More informationReal-Time Market Data Technology Overview
Real-Time Market Data Technology Overview Zoltan Radvanyi Morgan Stanley Session Outline What is market data? Basic terms used in market data world Market data processing systems Real time requirements
More informationBusiness Case Modelling 2 Day Course This course is presented in London on: October, May 2018, November 2018
Business Case Modelling 2 Day Course This course is presented in London on: 30-31 October, 17-18 May 2018, 29-30 November 2018 The Banking and Corporate Finance Training Specialist Background of the trainer
More informationMix-nets for long-term privacy
Mix-nets for long-term privacy October 2017 Núria Costa nuria.costa@scytl.com Index 1. Introdution: Previous work 2. Mix-nets 3. Lattice-based cryptography 4. Proof of a shuffle for lattice-based cryptography
More informationSecure Two-party Threshold ECDSA from ECDSA Assumptions. Jack Doerner, Yashvanth Kondi, Eysa Lee, and abhi shelat Northeastern University
Secure Two-party Threshold ECDSA from ECDSA Assumptions Jack Doerner, Yashvanth Kondi, Eysa Lee, and abhi shelat Northeastern University Elliptic Curve Digital Signature Algorithm Digital Signature Algorithm
More informationCHAPTER 6 DATA ANALYSIS AND INTERPRETATION
208 CHAPTER 6 DATA ANALYSIS AND INTERPRETATION Sr. No. Content Page No. 6.1 Introduction 212 6.2 Reliability and Normality of Data 212 6.3 Descriptive Analysis 213 6.4 Cross Tabulation 218 6.5 Chi Square
More informationIntrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser
More informationFig. 1. Min-Max Timing Simulation 1, 3 1, 2 1, 2 1, , 3 3, 4
2009 27th IEEE VLSI Test Symposium Output Hazard-Free Transition Delay Fault Test Generation Sreekumar Menon 1, Adit D. Singh 2, Vishwani Agrawal 2 1 Advanced Micro Devices 7171 Southwest Parkway Austin,
More information