Strong PUFs: Models, constructions, and security proofs

78Citations
Citations of this article
47Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Electronic devices have pervaded our everyday life to a previously unseen extent, and will likely continue to do so in the future. But their ubiquity also makes them a potential target for adversaries and brings about privacy and information security issues.

Cite

CITATION STYLE

APA

Rührmair, U., Busch, H., & Katzenbeisser, S. (2010). Strong PUFs: Models, constructions, and security proofs. In Information Security and Cryptography (Vol. 0, pp. 79–96). Springer International Publishing. https://doi.org/10.1007/978-3-642-14452-3_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free