Physical Random Functions

In general, secure protocols assume that participants are able to maintain secret key information. In practice, this assumption is often incorrect as an increasing number of devices are vulnerable to physical attacks. Typical examples of vulnerable devices are smartcards and Automated Teller Machin...

Cur síos iomlán

Sonraí bibleagrafaíochta
Príomhchruthaitheoir: Gassend, Blaise
Rannpháirtithe: Devadas, Srinivas
Foilsithe / Cruthaithe: 2023
Rochtain ar líne:https://hdl.handle.net/1721.1/149975