functions. Towards Hardware-Intrinsic Security, pages
39–53. Springer.
Haroon, A., Akram, S., Shah, M. A., & Wahid, A. (2017).
E-lithe: A lightweight secure dtls for iot. In 2017 IEEE
86th Vehicular Technology Conference (VTC-Fall) (pp.
1-5). IEEE.
Katzenbeisser, S., Kocabaş, Ü., Van Der Leest, V., Sadeghi,
A. R., Schrijen, G. J., & Wachsmann, C. (2011).
Recyclable PUFs: Logically reconfigurable PUFs.
Journal of Cryptographic Engineering, 1(3), pp. 177–
186.
Kirkpatrick M. S., Bertino E., and Kerr S. (2010). PUF
ROKs: generating read-once keys from physically
unclonable functions. Proceedings of the Sixth Annual
Workshop on Cyber Security and Information
Intelligence Research. ACM.
Kocabaş, Ü., Peter, A., Katzenbeisser, S., Sadeghi, A.-R.
(2012). Converse PUF-Based Authentication. In:
Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer,
M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol.
7344, pp. 142–158. Springer, Heidelberg.
Kodýtek, F., Lórencz, R. (2015). A design of ring oscillator
based PUF on FPGA. In Design and Diagnostics of
Electronic Circuits & Systems (DDECS), 2015 IEEE
18th International Symposium on. IEEE.
Kodýtek, F., Lórencz, R., Buček J. (2016) Improved ring
oscillator PUF on FPGA and its properties.
Microprocessors and Microsystems.
Kohlbrenner P., Gaj K. (2004). An embedded true random
number generator for FPGAs. Proceedings of the 2004
ACM/SIGDA 12th international symposium on Field
programmable gate arrays. ACM.
McKay K. A. (2017). Report on Lightweight Cryptography
– NIST publication, available online https://doi.org/
10.6028/NIST.IR.8114
Maes R., Van Herrewege A., and Verbauwhede I. (2012).
PUFKY: a fully functional PUF-based cryptographic
key generator. In International Workshop on
Cryptographic Hardware and Embedded Systems,
pages 302–319. Springer.
Majzoobi, M., Rostami, M., Koushanfar, F., Wallach, D.S.,
Devadas, S. (2012). Slender PUF Protocol: A
Lightweight, Robust, and Secure Authentication by
Substring Matching. In: IEEE Symposium on Security
and Privacy (SP), pp. 33–44.
Malina L., Hajny J., Fujdiak R., and Hosek J. (2016). On
perspective of security and privacy-preserving
solutions in the internet of things. Computer Networks,
102:83– 95.
Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A.
(1996). Handbook of applied cryptography. CRC press.
Öztürk, E., Hammouri, G., Sunar, B. (2008). Towards
Robust Low-Cost Authentication for Pervasive
Devices. In: IEEE Conference on Pervasive Computing
and Communications, PerCom.
Pappu, R., Recht, B., Taylor, J., and Gershenfeld, N.
(2002). Physical one-way functions. Science,
297(5589):2026–2030.
Raza, S., Shafagh, H., Hewage, K., Hummen, R., & Voigt,
T. (2013). Lithe: Lightweight secure CoAP for the
internet of things. IEEE Sensors Journal, 13(10), 3711-
3720.
Roman R., Zhou J., and Lopez J. (2013). On the features
and challenges of security and privacy in distributed
internet of things. Computer Networks, 57(10):2266–
2279.
RSA Laboratories: PKCS #5 V2.1: Password Based
Cryptography Standard (2012)
Schindler W. (2009). Random number generators for
cryptographic applications. In Cryptographic
Engineering, pages 5–23. Springer.
Schleiffer Ch., Wolf M., Weimerskirch A., and
Wolleschensky L. (2013). Secure key management-a
key feature for modern vehicle electronics. Technical
report, SAE Technical Paper.
Sicari S., Rizzardi A., Grieco L. A., Coen-Porisini A.
(2015). Security, privacy and trust in internet of things:
The road ahead. Computer Networks, 76:146–164.
Sklavos, N, Zaharakis I. D. (2016). Cryptography and
Security in Internet of Things (IoTs): Models, Schemes,
and Implementations, In IEEE proceedings of the 8th
IFIP International Conference on New Technologies,
Mobility and Security (NTMS’16), Larnaca, Cyprus
Suh E. G., Devadas S. (2007). Physical unclonable
functions for device authentication and secret key
generation. In Proceedings of the 44th annual Design
Automation Conference, pages 9–14. ACM.
Suh E. G., O'Donnell Ch. W., and Devadas S. (2007).
Aegis: A single-chip secure processor. IEEE Design &
Test of Computers 24.6.
Tkacik T. E. (2003), A hardware random number generator,
in Proceedings of the Cryptographic Hardware and
Embedded Systems (CHES '02), B. S. Kaliski Jr., Ç. K.
Koç, and C. Paar, Eds., vol. 2523 of Lecture Notes in
Computer Science, pp. 450–453, Springer, Redwood
Shores, Calif, USA.
Tschofenig, H. and T. Fossati," Transport Layer Security
(TLS)/Datagram Transport Layer Security (DTLS)
Profiles for the Internet of Things. RFC 7925, July
2016.
Van Herrewege, A., Katzenbeisser, S., Maes, R., Peeters,
R., Sadeghi, A.-R., Verbauwhede, I., Wachsmann, C.
(2012). Reverse Fuzzy Extractors: Enabling
Lightweight Mutual Authentication for PUF-Enabled
RFIDs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol.
7397, pp. 374–389. Springer, Heidelberg.