Research Article
Single-Round Pattern Matching Key Generation Using Physically Unclonable Function
Table 4
Comparison of PMKG schemes.
| Item | PMKG [9] | C-PMKG [25] | SC-PMKG |
| , | 128 | 128 | 128 | H(Source) | 160 | 160 | 160 | H(Index) | 10 | 8 () | | ♯rounds, | 16 | 20 (22) | 1 | ♯indexes/round, | 1 | 1 | 22 | , | 256 | 256 (160) | 160 | , | 1279 | 256 (160) | 3520 | | 20464 | 5120 (3520) | 3520 | | 4096 | 5120 (3520) | 3776 |
| Additional functions over PMKG | – | | , | design | Complicated | Complicated | Simple | Snake attacks | Vulnerable | Secure | Secure | Provable security | Unknown | Unknown | Yes |
|
|