Author of the publication

Pseudo-LFSR PUF: A Compact, Efficient and Reliable Physical Unclonable Function.

, , , and . ReConFig, page 223-228. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hori, Yohei
add a person with the name Hori, Yohei
 

Other publications of authors with the same name

DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions., , , and . DSN, page 302-314. IEEE, (2019)Pseudo-LFSR PUF: A Compact, Efficient and Reliable Physical Unclonable Function., , , and . ReConFig, page 223-228. IEEE Computer Society, (2011)Development of the Unified Security Requirements of PUFs During the Standardization Process., , , , , , , and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 314-330. Springer, (2018)A Secure Digital Content Delivery System Based on Partially Reconfigurable Hardware., , , and . FPT, page 253-256. IEEE, (2007)A Fast Power Current Simulation of Cryptographic VLSI Circuits for Side Channel Attack Evaluation., , , , , and . IEICE Transactions, 96-A (12): 2533-2541 (2013)Development of an Evaluation Platform and Performance Experimentation of Flex Power FPGA Device., , , and . IEICE Transactions, 101-D (2): 303-313 (2018)A Shogi Processor with a Field Programmable Gate Array., , , , and . Computers and Games, volume 2063 of Lecture Notes in Computer Science, page 297-314. Springer, (2000)An FPGA-based processor for shogi mating problems., , and . FPT, page 117-124. IEEE, (2002)Bitstream Protection in Dynamic Partial Reconfiguration Systems Using Authenticated Encryption., , , , and . IEICE Transactions, 96-D (11): 2333-2343 (2013)Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems., , , and . IWSEC, volume 5312 of Lecture Notes in Computer Science, page 261-278. Springer, (2008)