<--- Back to Details
First PageDocument Content
Physical Unclonable Function / Coding theory / Data transmission / Computer arithmetic / Hamming / Forward error correction / Bit error rate / Hardware random number generator / VEST / Cryptography / Randomness / Error detection and correction
Date: 2014-12-28 14:37:53
Physical Unclonable Function
Coding theory
Data transmission
Computer arithmetic
Hamming
Forward error correction
Bit error rate
Hardware random number generator
VEST
Cryptography
Randomness
Error detection and correction

Noname manuscript No. (will be inserted by the editor) How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 341,37 KB

Share Document on Facebook

Similar Documents

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan  Developers seek to seamlessly integrate cyber

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

DocID: 1qIlJ - View Document

Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

DocID: 1pLac - View Document

ˇ Publications by Boris Skori´ c ˇ [1] B. Skori´ c. Unclonable encryption revisited: 4x2=8, 2015. https://eprint.iacr.org.

ˇ Publications by Boris Skori´ c ˇ [1] B. Skori´ c. Unclonable encryption revisited: 4x2=8, 2015. https://eprint.iacr.org.

DocID: 1oRfk - View Document

2013 IEEE Symposium on Security and Privacy  PUFs in Security Protocols: Attack Models and Security Evaluations Ulrich R¨uhrmair Computer Science Department Technische Universit¨at M¨unchen

2013 IEEE Symposium on Security and Privacy PUFs in Security Protocols: Attack Models and Security Evaluations Ulrich R¨uhrmair Computer Science Department Technische Universit¨at M¨unchen

DocID: 1aUdk - View Document

www.cost.eu/ict  COST Action no. IC1204 2012⏐2016

www.cost.eu/ict COST Action no. IC1204 2012⏐2016

DocID: 1aAZE - View Document