Login / Signup

An efficient modeling attack for breaking the security of XOR-Arbiter PUFs by using the fully connected and long-short term memory.

Sina Soleimani FardMasoud KavehMohammad Reza MosaviSeok-Bum Ko
Published in: Microprocess. Microsystems (2022)
Keyphrases