Abstract
In this book, the topic of physically unclonable functions was covered in an all-encompassing manner, introducing the PUF concept and the multitude of their constructions, listing and defining their properties, and finally detailing their most important applications. This chapter summarizes the main findings, results and contributions of this book on a chapter-by-chapter basis. Finally, as an invitation to the reader, a number of open questions and other future research directions are put forward.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., & Tuyls, P. (2009). Memory leakage-resilient encryption based on physically unclonable functions. In Lecture notes in computer science (LNCS): Vol. 5912. Advances in cryptology—ASIACRYPT 2009 (pp. 685–702). Berlin: Springer.
Karakoyunlu, D., & Sunar, B. (2010). Differential template attacks on PUF enabled cryptographic devices. In IEEE international workshop on information forensics and security—WIFS 2010 (pp. 1–6). New York: IEEE.
Merli, D., Schuster, D., Stumpf, F., & Sigl, G. (2011). Side-channel analysis of PUFs and fuzzy extractors. In Lecture notes in computer science (LNCS): Vol. 6740. International conference on trust and trustworthy computing—TRUST 2011 (pp. 33–47). Berlin: Springer.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Maes, R. (2013). Conclusion and Future Work. In: Physically Unclonable Functions. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41395-7_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-41395-7_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41394-0
Online ISBN: 978-3-642-41395-7
eBook Packages: Computer ScienceComputer Science (R0)