Picture for Khalid T. Mursi

Khalid T. Mursi

Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device

Add code
Oct 04, 2022
Figure 1 for Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Figure 2 for Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Figure 3 for Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Figure 4 for Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Viaarxiv icon

A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks

Add code
Jun 02, 2022
Figure 1 for A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
Figure 2 for A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
Figure 3 for A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
Figure 4 for A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
Viaarxiv icon