Paper 2019/300

Transient Effect Ring Oscillators Leak Too

Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, and Viktor Fischer


Up to now, the transient effect ring oscillator (TERO) seemed to be a better building block for PUFs than a standard ring oscillator, since it was thought to be immune to electromagnetic analysis. Here, we report for the first time that TERO PUFs are in fact vulnerable to electromagnetic analysis too. First, we propose a spectral model of a TERO cell output, showing how to fit it to experimental data obtained with the help of a spectrum analyser to recover the number of oscillations of a TERO cell. We then extend it to two TERO cells oscillating simultaneously, and show how this ability can be used to fully clone a TERO PUF. These results should help designers to better plan for susceptibility of TERO PUFs to electromagnetic analysis in their future designs.

Available format(s)
Publication info
Preprint. MINOR revision.
Transient effect ring oscillatorelectromagnetic leaksside-channel analysissemi-invasive passive attackphysical unclonable function
Contact author(s)
b colombier @ univ-st-etienne fr
2019-03-20: received
Short URL
Creative Commons Attribution


      author = {Ugo Mureddu and Brice Colombier and Nathalie Bochard and Lilian Bossuet and Viktor Fischer},
      title = {Transient Effect Ring Oscillators Leak Too},
      howpublished = {Cryptology ePrint Archive, Paper 2019/300},
      year = {2019},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.