Sort by
Computer Science
Functions
100%
Design
70%
Attack
43%
Ring Oscillator
43%
Field Programmable Gate Arrays
32%
Hardware
32%
Uniqueness
24%
Approximate Computing
22%
Trojans
20%
Authentication
15%
Internet of Things
14%
Entropy
14%
Models
14%
Random Access Memory
13%
Field Programmable Gate Arrays
13%
Machine Learning
13%
Hardware Security
13%
Evaluation
12%
Authentication Protocol
11%
Experimental Result
11%
Application
11%
Identification
10%
Detection
10%
Decryption
8%
Security Vulnerability
7%
High Reliability
7%
Flip-Flop
7%
Artificial Intelligence
7%
Internet-Of-Things
7%
Bit Cell
7%
Energy Efficient
7%
Encryption
6%
Experimental Result
6%
Internet of Things Device
6%
Computer Hardware
6%
Software
6%
Cryptographic Engine
6%
Mutual Authentication
6%
Power Consumption
6%
Correlation
6%
Random Access Memory
5%
side-channel
5%
Approximation (Algorithm)
5%
Learning System
5%
Machine Learning
5%
Testing
5%
Hardware Resource
5%
Neural Network
5%