Published September 24, 2021
| Version v3
Dataset
Open
pypuf data
Description
Collection of PUF challenge-response data, currently consisting of:
1. Charlot, N., Canaday, D., Pomerance, A. & Gauthier, D. J. Hybrid Boolean Networks as Physically Unclonable Functions. IEEE Access 9, 44855–44867 (2021).
2. Aghaie, A. & Moradi, A. Inconsistency of Simulation and Practice in Delay-based Strong PUFs. IACR Transactions on Cryptographic Hardware and Embedded Systems 520–551 (2021) doi:10.46586/tches.v2021.i3.520-551.
3. Mursi, K. T., Thapaliya, B., Zhuang, Y., Aseeri, A. O. & Alkatheiri, M. S. A Fast Deep Learning Method for Security Vulnerability Study of XOR PUFs. Electronics 9, 1715 (2020).
Files
Files
(276.1 MB)
Name | Size | Download all |
---|---|---|
md5:5d52e67d6372fd88edd33a5c9fca63a2
|
10.6 MB | Download |
md5:df382569c5c7bd517b59c3b2cb0df680
|
10.6 MB | Download |
md5:b428b123f49ca7f1fd1898ceb1b1634c
|
10.6 MB | Download |
md5:c9b72f254c7b6013c789938cc6b5692f
|
10.6 MB | Download |
md5:32d6f09f393ef356558beabf411fa5eb
|
10.6 MB | Download |
md5:ecea4b58965f878c0182eb4fb966840a
|
10.4 MB | Download |
md5:1da6ca3aaf6c17f61a2e39093d196487
|
10.4 MB | Download |
md5:6c1b1e3eef57a92362329dfadd3edb86
|
2.2 MB | Download |
md5:1b8684d4b87bfbcab249617607d03d73
|
2.1 MB | Download |
md5:ba90e176d3320b744767cd470c20ec7c
|
1.7 MB | Download |
md5:bf9b70cefc4a3dc913ef3bcc6addf69e
|
1.9 MB | Download |
md5:2ea70dd0c3b1682ff33370d1e077bc98
|
2.1 MB | Download |
md5:412e3a972d6f8374bdc1d6693e8cafff
|
2.0 MB | Download |
md5:f8cc392231b80da4b28430d24d8c8a18
|
2.0 MB | Download |
md5:4ca21958153819f69d7fedb81527a230
|
2.0 MB | Download |
md5:d2132e2a6b99cbb6aa98425bcc35aff4
|
10.3 MB | Download |
md5:9621255a2eaaa85269cebdd57249de52
|
10.3 MB | Download |
md5:e26d121ce0815589c9175299eaf39c35
|
10.3 MB | Download |
md5:515df3f5fa6ce92cc2ebc49463857dce
|
51.7 MB | Download |
md5:b7f6ee930fde760db7fae29faafded08
|
51.7 MB | Download |
md5:6fce75f4fc6ec97b8746147c951932ed
|
51.7 MB | Download |