Sign in

Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines.

Anita AghaieAmir MoradiJohannes TobischNils Wisiol
Published in: HOST (2022)
Keyphrases
  • security analysis
  • public key
  • data management
  • security requirements
  • security properties
  • authentication scheme