No project description provided
Project description
pypuf: Cryptanalysis of Physically Unclonable Functions
pypuf is a toolbox for simulation, testing, and attacking Physically Unclonable Functions.
Studies and Results
pypuf is used in the following projects:
- 2020, Wisiol et al.: Splitting the Interpose PUF: A Novel Modeling Attack Strategy: Modeling attacks on the Interpose PUF using Logistic Regression in a Divide-and-Conquer strategy.
- 2020, Wisiol et al.: Short Paper: XOR Arbiter PUFs have Systematic Response Bias: Empirical and theoretical study of XOR Arbiter PUF response bias for unbiased arbiter chains.
- 2019, Wisiol et al.: Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance: An advanced machine learning attack on the Lightweight Secure PUF.
- 2019, Wisiol et al.: Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs: Simulation of the stabiltiy of Majority Vote XOR Arbiter PUFs.
Using pypuf
To get started, please check out the documentation.
Contribute
Testing, linting.
Citation
Cite as: TODO
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
pypuf-0.0.3.tar.gz
(16.3 kB
view hashes)
Built Distribution
pypuf-0.0.3-py2.py3-none-any.whl
(28.7 kB
view hashes)
Close
Hashes for pypuf-0.0.3-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | f13b4e2f1cde8ca62441f2a7351c24eea32199e4ad8d0031511090ef8bdbae7a |
|
MD5 | 567a49a0d6d6687c7feba103c1d42144 |
|
BLAKE2b-256 | bb8240576490b8b2a1b961d16a86d910ea5b0474ee77e8459ea07d7443408f92 |