{"id":"https://openalex.org/W4312575980","doi":"https://doi.org/10.1109/tifs.2022.3214089","title":"Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange","display_name":"Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4312575980","doi":"https://doi.org/10.1109/tifs.2022.3214089"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3214089","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3214089","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060225959","display_name":"Durba Chatterjee","orcid":"https://orcid.org/0000-0001-7665-0876"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Durba Chatterjee","raw_affiliation_strings":["Indian Institute of Technology Kharagpur, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kharagpur, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015473813","display_name":"Harishma Boyapally","orcid":"https://orcid.org/0000-0002-2742-0772"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Harishma Boyapally","raw_affiliation_strings":["Indian Institute of Technology Kharagpur, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kharagpur, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071719477","display_name":"Sikhar Patranabis","orcid":"https://orcid.org/0000-0002-2309-7939"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sikhar Patranabis","raw_affiliation_strings":["Department of Computer Science, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078243950","display_name":"Urbi Chatterjee","orcid":"https://orcid.org/0000-0002-4631-2208"},"institutions":[{"id":"https://openalex.org/I94234084","display_name":"Indian Institute of Technology Kanpur","ror":"https://ror.org/05pjsgx75","country_code":"IN","type":"education","lineage":["https://openalex.org/I94234084"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Urbi Chatterjee","raw_affiliation_strings":["Indian Institute of Technology Kanpur, Kanpur, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kanpur, Kanpur, India","institution_ids":["https://openalex.org/I94234084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022880201","display_name":"Aritra Hazra","orcid":"https://orcid.org/0000-0003-2076-3577"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Aritra Hazra","raw_affiliation_strings":["Indian Institute of Technology Kharagpur, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kharagpur, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078971402","display_name":"Debdeep Mukhopadhyay","orcid":"https://orcid.org/0000-0002-6499-8346"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debdeep Mukhopadhyay","raw_affiliation_strings":["Indian Institute of Technology Kharagpur, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kharagpur, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5060225959"],"corresponding_institution_ids":["https://openalex.org/I145894827"],"apc_list":null,"apc_paid":null,"fwci":3.1798,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.92609829,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"17","issue":null,"first_page":"3847","last_page":"3862"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9520999789237976,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8408563733100891},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.761279821395874},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6930900812149048},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6021952629089355},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5824622511863708},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5729538202285767},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4758721888065338},{"id":"https://openalex.org/keywords/abstraction","display_name":"Abstraction","score":0.4749037027359009},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.47384268045425415},{"id":"https://openalex.org/keywords/shared-secret","display_name":"Shared secret","score":0.4547814428806305},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4294244647026062},{"id":"https://openalex.org/keywords/information-exchange","display_name":"Information exchange","score":0.4246810972690582},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.41839519143104553},{"id":"https://openalex.org/keywords/authenticated-key-exchange","display_name":"Authenticated Key Exchange","score":0.41806545853614807},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.40621981024742126},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.394263356924057},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.37453019618988037},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3544553518295288},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35236895084381104},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3479522466659546},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.23759856820106506}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8408563733100891},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.761279821395874},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6930900812149048},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6021952629089355},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5824622511863708},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5729538202285767},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4758721888065338},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.4749037027359009},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.47384268045425415},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.4547814428806305},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4294244647026062},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.4246810972690582},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.41839519143104553},{"id":"https://openalex.org/C2777572472","wikidata":"https://www.wikidata.org/wiki/Q4825878","display_name":"Authenticated Key Exchange","level":5,"score":0.41806545853614807},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.40621981024742126},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.394263356924057},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37453019618988037},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3544553518295288},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35236895084381104},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3479522466659546},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.23759856820106506},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3214089","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3214089","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321024","display_name":"Defence Research and Development Organisation","ror":"https://ror.org/05k37v296"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W104720657","https://openalex.org/W156132949","https://openalex.org/W626997161","https://openalex.org/W1480909796","https://openalex.org/W1482341641","https://openalex.org/W1523586819","https://openalex.org/W1527077352","https://openalex.org/W1873852107","https://openalex.org/W1877660496","https://openalex.org/W1927099252","https://openalex.org/W1966117405","https://openalex.org/W1975783211","https://openalex.org/W1980073965","https://openalex.org/W2004881597","https://openalex.org/W2032551902","https://openalex.org/W2101234009","https://openalex.org/W2117455301","https://openalex.org/W2135654420","https://openalex.org/W2153281696","https://openalex.org/W2157549033","https://openalex.org/W2293018556","https://openalex.org/W2398609434","https://openalex.org/W2407036733","https://openalex.org/W2407885186","https://openalex.org/W2408518707","https://openalex.org/W2609047018","https://openalex.org/W2733358165","https://openalex.org/W2764210399","https://openalex.org/W2798357646","https://openalex.org/W2801237935","https://openalex.org/W2883305949","https://openalex.org/W2885724825","https://openalex.org/W2888413717","https://openalex.org/W2911964244","https://openalex.org/W2966194856","https://openalex.org/W2971247663","https://openalex.org/W2990954110","https://openalex.org/W2993747420","https://openalex.org/W3006652224","https://openalex.org/W3008113484","https://openalex.org/W3014191751","https://openalex.org/W3016071202","https://openalex.org/W3034680951","https://openalex.org/W3046451111","https://openalex.org/W3095737689","https://openalex.org/W3140672266","https://openalex.org/W3159209806","https://openalex.org/W3202515853","https://openalex.org/W4239510810","https://openalex.org/W4312575980","https://openalex.org/W6606357357","https://openalex.org/W6675354045","https://openalex.org/W6763492527"],"related_works":["https://openalex.org/W1638503251","https://openalex.org/W1488961395","https://openalex.org/W2102905434","https://openalex.org/W2183582611","https://openalex.org/W2611446508","https://openalex.org/W4386044217","https://openalex.org/W2185700045","https://openalex.org/W2484177002","https://openalex.org/W4312575980","https://openalex.org/W2339335887"],"abstract_inverted_index":{"This":[0,92],"paper":[1],"initiates":[2],"the":[3,37,109,123,134,225,235,253],"study":[4,31],"of":[5,32,49,100,125,139,150,173,182,196,221,237,247],"\u201cCryptophasia":[6],"in":[7,83,111,122,184],"Hardware\u201d":[8],"\u2013":[9,190],"a":[10,64,84,129,146,179,191,202],"phenomenon":[11],"that":[12,78,119,159,205,218],"allows":[13],"hardware":[14,185],"circuits/devices":[15],"with":[16],"no":[17,166],"pre-established":[18],"secret":[19,24,81],"keys":[20,53],"to":[21,39],"securely":[22,50],"exchange":[23,80],"information":[25,82],"over":[26,89,186,252],"insecure":[27,90],"communication":[28,42,250],"networks.":[29,91],"The":[30],"cryptophasia":[33],"is":[34,206],"motivated":[35],"by":[36,228,241],"need":[38],"establish":[40],"secure":[41,85,155,171],"channels":[43],"between":[44,113],"lightweight":[45,147],"resource-constrained":[46,214],"devices":[47],"incapable":[48],"storing":[51],"cryptographic":[52,57,174],"and/or":[54],"executing":[55],"resource-intensive":[56],"protocols.":[58],"In":[59,141],"this":[60,142],"paper,":[61],"we":[62,120,144,177],"introduce":[63],"novel":[65],"concept":[66],"called":[67],"<italic":[68,74],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[69,75],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Physically":[70],"Related":[71],"Functions</i>":[72],"(":[73],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">PReFs</i>":[76],")":[77],"can":[79,94],"and":[86,136,164,201,249],"authenticated":[87,156],"manner":[88],"function":[93],"be":[95],"visualized":[96],"as":[97,170],"an":[98,117,197],"abstraction":[99],"Strong":[101,106],"Physically":[102],"Unclonable":[103],"Functions":[104],"(PUFs).":[105],"PUFs":[107],"have":[108],"limitation":[110],"communicating":[112],"two":[114],"identical":[115],"devices,":[116],"issue":[118],"address":[121],"definition":[124],"PReFs.":[126,140],"We":[127,216,232],"describe":[128],"formal":[130,230],"framework":[131],"for":[132,209],"analyzing":[133,242],"functional":[135],"security":[137],"requirements":[138],"framework,":[143],"present":[145,178],"(in":[148,245],"terms":[149,246],"computation":[151],"cost)":[152],"yet":[153],"provably":[154],"key-exchange":[157],"protocol":[158,240],"relies":[160],"only":[161],"on":[162],"PReFs":[163,183,222],"makes":[165],"additional":[167],"assumptions":[168],"(such":[169],"storage":[172],"keys).":[175],"Finally,":[176],"proof-of-concept":[180],"realization":[181,220],"Digilent":[187,254],"Cora":[188,255],"Z7":[189,256],"low-cost":[192],"development":[193],"platform":[194],"(consisting":[195],"ARM":[198],"Cortex":[199],"processor":[200],"Xilinx":[203],"FPGA)":[204],"particularly":[207],"suitable":[208],"real-world":[210],"IoT":[211],"applications":[212],"involving":[213],"devices.":[215],"validate":[217],"our":[219,229,238],"satisfies":[223],"all":[224],"properties":[226],"warranted":[227],"framework.":[231],"further":[233],"demonstrate":[234],"efficacy":[236],"proposed":[239],"its":[243],"performance":[244],"computational":[248],"latency)":[251],"platform.":[257]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
