Login / Signup
Approximation Attacks on Strong PUFs.
Junye Shi
Yang Lu
Jiliang Zhang
Published in:
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. (2020)
Keyphrases
</>
countermeasures
cooperative
error bounds
efficient computation
computer security
approximation error
traffic analysis
chosen plaintext
multiscale
watermarking scheme
queueing networks
continuous functions
malicious attacks
attack detection
detect malicious