Physical Random Functions

In general, secure protocols assume that participants are able to maintain secret key information. In practice, this assumption is often incorrect as an increasing number of devices are vulnerable to physical attacks. Typical examples of vulnerable devices are smartcards and Automated Teller Machin...

Full description

Bibliographic Details
Main Author: Gassend, Blaise
Other Authors: Devadas, Srinivas
Published: 2023
Online Access:https://hdl.handle.net/1721.1/149975