Sign in

Exploring active manipulation attacks on the TERO random number generator.

Yang CaoVladimir RozicBohan YangJosep BalaschIngrid Verbauwhede
Published in: MWSCAS (2016)
Keyphrases
  • random number generator
  • random number
  • countermeasures
  • fingerprint authentication
  • traffic analysis
  • shift register
  • information systems
  • pseudorandom
  • cooperative
  • computer security
  • security protocols