Sign in
Design Exploration and Security Assessment of PUF-on-PUF Implementations.
Kleber Stangherlin
Zhuanhao Wu
Hiren D. Patel
Manoj Sachdev
Published in:
CoRR (2022)
Keyphrases
</>
electronic devices
design process
building blocks
efficient implementation
engineering design
design methodology
functional requirements
intrusion detection
computer aided
information security
security threats
assessment tool