@inproceedings{b53dc10ed3bb4238889b399921c4adfc,
title = "Exploiting Lithography Limits for Hardware Security Applications",
abstract = "{\textcopyright} 2019 IEEE.Hardware security primitives such as physical obfuscated keys (POKs) allow tamper-resistant storage of random keys based on manufacturing or physical variability. The output bits of existing POK designs need to be first corrected due to measurement noise using error correction methods and then de-correlated by privacy amplification processes. These additional requirements increase the hardware overhead and reduce the efficiency of the system. In this work, we propose an intrinsically reliable POK design capable of generating random bits by exploiting the limits of the lithographic process for a given technology. Our design does not require any error correction and requires only XOR circuits for privacy amplification which reduces the hardware overhead of the whole system.",
author = "R.S. Khan and H. Silva and N. Noor and C. Jin and S. Muneer and F. Dirisaglik and A. Cywar and P.H. Nguyen and {Van Dijk}, M. and A. Gokirmak",
year = "2019",
month = jul,
day = "1",
doi = "10.1109/NANO46743.2019.8993902",
language = "English",
series = "Proceedings of the IEEE Conference on Nanotechnology",
publisher = "IEEE Computer Society",
pages = "9--12",
booktitle = "19th IEEE International Conference on Nanotechnology, NANO 2019",
note = "19th IEEE International Conference on Nanotechnology, NANO 2019 ; Conference date: 22-07-2019 Through 26-07-2019",
}