Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries.
Mehdi LetafatiHamid BehrooziBabak Hossein KhalajEduard A. JorswieckPublished in: IEEE Wirel. Commun. Lett. (2022)
Keyphrases
- low cost
- hardware and software
- hardware implementation
- computer systems
- real time
- vlsi implementation
- hardware architecture
- embedded systems
- computing systems
- standard pc
- hardware design
- high speed
- image processing
- personal computer
- secret key
- processing units
- graphics hardware
- image reconstruction
- hardware software
- learning algorithm