A novel security technique to generate truly random and highly reliable reconfigurable ROPUF-based cryptographic keys.
Fathi AmsaadAtul PrasadChayanika RoychaudhuriMohammed Y. NiamatPublished in: HOST (2016)
Keyphrases
- highly reliable
- security protocols
- random number generator
- key management
- security properties
- hash functions
- smart card
- secret key
- encryption scheme
- encryption decryption
- information security
- key agreement
- stream cipher
- secure communication
- security requirements
- low cost
- security systems
- chosen plaintext
- fuzzy vault
- cryptographic protocols
- private key
- security analysis
- security services
- elliptic curve cryptography
- security policies
- encryption key
- data security
- statistical databases
- access control
- network security
- security issues
- public key
- sensitive data
- security mechanisms
- provably secure
- public key cryptography
- rfid tags
- security level
- cryptographic algorithms
- hardware implementation
- end to end
- shortest path
- identity based encryption
- public key encryption