搜索结果: 1-2 共查到“军事学 Possibilities”相关记录2条 . 查询时间(0.043 秒)
Possibilities and Impossibilities for PUF Protocols under PUF Re-Use and PUFs-inside-PUFs Attacks
Physical Unclonable Functions Cryptographic Protocols
2016/3/23
We continue investigations on the use of so-called Strong PUFs as a cryptographic primitive in realistic attack models. We focus on two scenarios: Firstly, the {\it PUF re-use model}, where PUFs are b...
On the Possibilities and Limitations of Computational Fuzzy Extractors
error-correcting code leakage-resilient cryptography key encapsulation mechanism
2016/1/8
Fuller et al. (Asiacrypt 2013) studied on computational fuzzy extractors, and showed, as a
negative result, that the existence of a computational “secure sketch” implies the existence of an
informat...