Abstract: Reconfigurable systems often require secret keys for encrypting and decrypting data. To address this need, applications requiring high security typically use physical unclonable functions ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results