Hardware Authentication Based on PUFs and SHA-3 2nd Round Candidates

doi 10.1109/icm.2010.5696149
Full Text
Abstract

Available in full text

Date
Authors
Publisher

IEEE