Implementation of PUF based on RO circuit
The modern cryptographic protocol specifies that only authorized participants can gain access to the key and obtain information. However, the way to leak passwords through intrusion into the system is endless, causing serious problems for modern information security. On this issue, the advantages of...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
National Computer System Engineering Research Institute of China
2018-05-01
|
Series: | Dianzi Jishu Yingyong |
Subjects: | |
Online Access: | http://www.chinaaet.com/article/3000082241 |