Implementation of PUF based on RO circuit

The modern cryptographic protocol specifies that only authorized participants can gain access to the key and obtain information. However, the way to leak passwords through intrusion into the system is endless, causing serious problems for modern information security. On this issue, the advantages of...

Full description

Bibliographic Details
Main Authors: Li Xueying, Li Lei, Hu Jianhao, Yang Shenghua
Format: Article
Language:zho
Published: National Computer System Engineering Research Institute of China 2018-05-01
Series:Dianzi Jishu Yingyong
Subjects:
Online Access:http://www.chinaaet.com/article/3000082241