A Deep Learning Method for the Security Vulnerability Study of Feed-Forward Physical Unclonable Functions

Authentication is critical for Internet-of-Things. The traditional approach of using cryptographic keys is subject to invasive attacks. Being unclonable even by the manufacturers, physical unclonable functions (PUFs) leverage integrated circuits’ manufacturing variations to produce responses unique...

Full description

Saved in:
Bibliographic Details
Published in:Arabian journal for science and engineering (2011) Vol. 49; no. 9; pp. 12291 - 12303
Main Authors: Alkatheiri, Mohammed Saeed, Aseeri, Ahmad O., Zhuang, Yu
Format: Journal Article
Language:English
Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.09.2024
Springer Nature B.V
Subjects:
ISSN:2193-567X, 1319-8025, 2191-4281
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first