Date: 2014-08-13 19:26:58Hashing Message authentication codes Search algorithms Cryptographic hash function Public-key cryptography Random number generation PUF Hash function One-way function Cryptography Randomness Physical Unclonable Function | | Controlled Physical Random Functions and Applications BLAISE GASSEND, MARTEN VAN DIJK, DWAINE CLARKE and EMINA TORLAK Massachusetts Institute of Technology PIM TUYLS Philips ResearchAdd to Reading ListSource URL: homes.cs.washington.eduDownload Document from Source Website File Size: 218,96 KBShare Document on Facebook
|