News
SRAM-based PUF Authentication and Integrity ... the implementation of the data remanence algorithm. We selected the cells that flipped their value in the shortest time (300ms). We consider that the ...
Abstract: Physical unclonable function (PUF ... authentication protocol, where no response is exposed to the adversary. Protocol B can be classified as the lightweight protocol because it can avoid ...
“It is a secure I2C co-processor with built-in 1-Wire master that combines FIPS202-compliant secure hash algorithm [SHA-3] challenge and ... brand for its ‘physically uncloneable function’ (PUF) – ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results