A Deep Learning Method for the Security Vulnerability Study of Feed-Forward Physical Unclonable Functions
Authentication is critical for Internet-of-Things. The traditional approach of using cryptographic keys is subject to invasive attacks. Being unclonable even by the manufacturers, physical unclonable functions (PUFs) leverage integrated circuits’ manufacturing variations to produce responses unique...
Saved in:
| Published in: | Arabian journal for science and engineering (2011) Vol. 49; no. 9; pp. 12291 - 12303 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.09.2024
Springer Nature B.V |
| Subjects: | |
| ISSN: | 2193-567X, 1319-8025, 2191-4281 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!