Login / Signup
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions.
Nathan Beckmann
Miodrag Potkonjak
Published in:
Information Hiding (2009)
Keyphrases
</>
public key cryptography
public key
low cost
real time
elliptic curve
provably secure
public key infrastructure
security model
digital signature
security services
authentication and key agreement
information systems
cost effective