Author of the publication

The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks.

, , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (4): 243-290 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Composite PUFs (Extended abstract-invited talk)., , , and . VDAT, page 1-2. IEEE, (2014)The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks., , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (4): 243-290 (2019)A Unified Convergence Analysis for Shuffling-Type Gradient Methods., , , , and . CoRR, (2020)Intrinsically Reliable and Lightweight Physical Obfuscated Keys, , , , , , , , , and 1 other author(s). (2017)A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 34 (8): 1334-1343 (2015)Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test., , , and . ACM Trans. Design Autom. Electr. Syst., 22 (2): 20:1-20:28 (2017)On 3-Share Threshold Implementations for 4-Bit S-boxes., , , and . COSADE, volume 7864 of Lecture Notes in Computer Science, page 99-113. Springer, (2013)Batch Clipping and Adaptive Layerwise Clipping for Differential Private Stochastic Gradient Descent., , , and . CoRR, (2023)Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure., , , , and . IACR Cryptol. ePrint Arch., (2021)Tutorial T7: Physically Unclonable Function: A Promising Security Primitive for Internet of Things., , , and . VLSID, page 14-15. IEEE Computer Society, (2015)