Abstract: In physical unclonable functions (PUFs) based key generation methods, the bias of PUF outputs would leak secrecy. A secure and robust key generation method based on PUFs and polar codes is ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results