Embedded Systems Authentication and Encryption Using Strong PUF Modeling.
Md Shahed Enamul QuadirJohn A. ChandyPublished in: ICCE (2020)
Keyphrases
- embedded systems
- low cost
- resource limited
- computing power
- embedded devices
- real time image processing
- embedded software
- embedded real time systems
- processing power
- encryption decryption
- real time systems
- data encryption
- field programmable gate array
- safety critical
- image authentication
- flash memory
- software systems
- electronic devices
- hw sw
- security mechanisms
- consumer electronics
- resource constrained