SRAM PUF fingerprints with Hamming code and temporal majority voting enable IIoT authentication with post-correction BER below 1%, using a design budget to trade response length against error-correction overhead.
A systematic method to evaluate and compare the performance of physical unclonable functions
1 Pith paper cite this work. Polarity classification is still indexing.
1
Pith paper citing it
fields
cs.CR 1years
2026 1verdicts
UNVERDICTED 1representative citing papers
citing papers explorer
-
Secure Authentication in Wireless IoT: Hamming Code Assisted SRAM PUF as Device Fingerprint
SRAM PUF fingerprints with Hamming code and temporal majority voting enable IIoT authentication with post-correction BER below 1%, using a design budget to trade response length against error-correction overhead.