Author of the publication

A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks.

, , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Islamic Radicalism Arabic Tweets Using Natural Language Processing., , , and . IEEE Access, (2022)A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks., , and . CoRR, (2021)Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited., , , and . IACR Cryptol. ePrint Arch., (2021)Machine Learning Attack on a Multiplexer PUF Variant Using Silicon Data: a Case Study on rMPUFs., and . ICCCS, page 1017-1022. IEEE, (2021)Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device., , and . CoRR, (2022)A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks., , , , and . CoRR, (2022)Experimental Study of Component-Differentially-Challenged XOR PUFs as Security Primitives for Internet-of-Things., and . J. Commun., 15 (10): 714-721 (2020)Does Sophisticating Double Arbiter PUF Design Ensure its Security? Performance and Security Assessments on 5-1 DAPUF., , , , and . IEEE BigData, page 1788-1795. IEEE, (2020)Neural Network Modeling Attacks on Arbiter-PUF-Based Designs., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)A Permutation Challenge Input Interface for Arbiter PUF Variants Against Machine Learning Attacks., , and . ISVLSI, page 418-421. IEEE, (2022)