Login / Signup
Security Evaluation of Ring Oscillator PUF Against Genetic Algorithm Based Modeling Attack.
Yusuke Nozaki
Masaya Yoshikawa
Published in:
IMIS (2019)
Keyphrases
</>
key exchange protocol
fault injection
information security
countermeasures
security measures
intrusion detection
information leakage
security threats
encryption algorithm
cyber attacks
security management
security model
security requirements
malicious users
security issues
access control
ring signature scheme