Author of the publication

A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks.

, , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Islamic Radicalism Arabic Tweets Using Natural Language Processing., , , and . IEEE Access, (2022)A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks., , and . CoRR, (2021)Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited., , , and . IACR Cryptol. ePrint Arch., (2021)A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks., , , , and . CoRR, (2022)Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device., , and . CoRR, (2022)Machine Learning Attack on a Multiplexer PUF Variant Using Silicon Data: a Case Study on rMPUFs., and . ICCCS, page 1017-1022. IEEE, (2021)Experimental Study of Component-Differentially-Challenged XOR PUFs as Security Primitives for Internet-of-Things., and . J. Commun., 15 (10): 714-721 (2020)Does Sophisticating Double Arbiter PUF Design Ensure its Security? Performance and Security Assessments on 5-1 DAPUF., , , , and . IEEE BigData, page 1788-1795. IEEE, (2020)Neural Network Modeling Attacks on Arbiter-PUF-Based Designs., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Machine Learning-based Vulnerability Study of Interpose PUFs as Security Primitives for IoT Networks., , and . NAS, page 1-7. IEEE, (2021)