Articles with "functions exploiting" as a keyword



Photo by hudsoncrafted from unsplash

Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3214089

Abstract: This paper initiates the study of “Cryptophasia in Hardware” – a phenomenon that allows hardware circuits/devices with no pre-established secret keys to securely exchange secret information over insecure communication networks. The study of cryptophasia is… read more here.

Keywords: key exchange; physically related; exchange; related functions ... See more keywords