Linked e-resources

Details

Introduction
Hardware Security Primitives and their Applications
Racetrack PUF
TERO PUF
Direct Characterization PUF
Volatile Memory Based PUF
Emerging Memory Based PUF
Extrinsic Characterization of PUF
Radio PUFs and CoAs
Optical PUFs
True Random Number Generators
Hardware Camouflaging
Temper Detection Methods
Embedded Watermarking
Counterfeit and Recycled IC Detection
Package-Level Counterfeit IC Detection
Side Channels Protection in Cryptographic Hardware
Fault Injection Resistant Cryptographic Hardware
Energy and Performance Optimization for Cryptography
Lightweight Cryptography
Post-Quantum Cryptography
Virtual Proof of Reality
Analog Security.

Browse Subjects

Show more subjects...

Statistics

from
to
Export