Sign in
Exploring active manipulation attacks on the TERO random number generator.
Yang Cao
Vladimir Rozic
Bohan Yang
Josep Balasch
Ingrid Verbauwhede
Published in:
MWSCAS (2016)
Keyphrases
</>
random number generator
random number
countermeasures
fingerprint authentication
traffic analysis
shift register
information systems
pseudorandom
cooperative
computer security
security protocols