Login / Signup
Quantum-activated neural reservoirs on-chip open up large hardware security models for resilient authentication.
Zhao He
Maxim S. Elizarov
Ning Li
Fei Xiang
Andrea Fratalocchi
Published in:
CoRR (2024)
Keyphrases
</>
low cost
neural model
security requirements
identity authentication
real time
information security
network architecture
embedded systems
security mechanisms
security analysis
circuit design
key distribution
key agreement protocol
data encryption
fuzzy vault