<--- Back to Details
First PageDocument Content
Public-key cryptography / Notary / Elliptic curve cryptography / Randomness / Finite fields / Radio-frequency identification / Authentication protocol / Physical unclonable function / Authentication / Digital signature / Quantum readout of PUFs / Types of physical unclonable function
Date: 2006-08-29 03:45:16
Public-key cryptography
Notary
Elliptic curve cryptography
Randomness
Finite fields
Radio-frequency identification
Authentication protocol
Physical unclonable function
Authentication
Digital signature
Quantum readout of PUFs
Types of physical unclonable function

Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

Add to Reading List

Source URL: events.iaik.tugraz.at

Download Document from Source Website

File Size: 228,43 KB

Share Document on Facebook

Similar Documents

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan  Developers seek to seamlessly integrate cyber

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

DocID: 1qIlJ - View Document

Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

DocID: 1pLac - View Document

ˇ Publications by Boris Skori´ c ˇ [1] B. Skori´ c. Unclonable encryption revisited: 4x2=8, 2015. https://eprint.iacr.org.

ˇ Publications by Boris Skori´ c ˇ [1] B. Skori´ c. Unclonable encryption revisited: 4x2=8, 2015. https://eprint.iacr.org.

DocID: 1oRfk - View Document

2013 IEEE Symposium on Security and Privacy  PUFs in Security Protocols: Attack Models and Security Evaluations Ulrich R¨uhrmair Computer Science Department Technische Universit¨at M¨unchen

2013 IEEE Symposium on Security and Privacy PUFs in Security Protocols: Attack Models and Security Evaluations Ulrich R¨uhrmair Computer Science Department Technische Universit¨at M¨unchen

DocID: 1aUdk - View Document

www.cost.eu/ict  COST Action no. IC1204 2012⏐2016

www.cost.eu/ict COST Action no. IC1204 2012⏐2016

DocID: 1aAZE - View Document