![Public-key cryptography / Notary / Elliptic curve cryptography / Randomness / Finite fields / Radio-frequency identification / Authentication protocol / Physical unclonable function / Authentication / Digital signature / Quantum readout of PUFs / Types of physical unclonable function Public-key cryptography / Notary / Elliptic curve cryptography / Randomness / Finite fields / Radio-frequency identification / Authentication protocol / Physical unclonable function / Authentication / Digital signature / Quantum readout of PUFs / Types of physical unclonable function](https://www.pdfsearch.io/img/01b1e64e29bedb34e054207bc8eb3970.jpg) Date: 2006-08-29 03:45:16Public-key cryptography Notary Elliptic curve cryptography Randomness Finite fields Radio-frequency identification Authentication protocol Physical unclonable function Authentication Digital signature Quantum readout of PUFs Types of physical unclonable function | | Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.VerbauAdd to Reading ListSource URL: events.iaik.tugraz.atDownload Document from Source Website File Size: 228,43 KBShare Document on Facebook
|