Keyphrases
Function-based
100%
Internet of Things
100%
Physical Unclonable Function
100%
Cryptographic Key
100%
Time Use
100%
Content Protection
100%
Protection Scheme
100%
Internet of Things Devices
50%
Communication Networks
50%
Real-world Application
25%
Commercially Available
25%
Vulnerability
25%
Bit Error Rate
25%
Error Correction Codes
25%
Potential Threats
25%
Channel Data
25%
Comprehensive Approach
25%
Text Comprehension
25%
Failure Rate
25%
Lower Error Rates
25%
Data Transfer
25%
Helper Data
25%
Key Generation
25%
Memory Device
25%
Error-correcting
25%
AES-256
25%
Response-based Cryptography
25%
Hash Function
25%
Side-channel Attacks
25%
Cryptographic Algorithms
25%
Static Random Access Memory
25%
Key Recovery
25%
High Security
25%
Data Leakage
25%
Robust Solution
25%
Cell Selection
25%
Random Cell
25%
Software Requirements
25%
Lightweight Solutions
25%
Low Latency
25%
Practical Flexibility
25%
Reduced Latency
25%
Bose-chaudhuri-hocquenghem
25%
AES-128
25%
Reed-Solomon
25%
Industrial Internet of Things (IIoT)
25%
Computer Science
Internet of Things
100%
Cryptographic Key
100%
Protection Scheme
100%
Communication Network
50%
Internet of Things Device
50%
World Application
25%
Potential Vulnerability
25%
Enhance Security
25%
Key Generation
25%
Hashing Function
25%
Potential Threat
25%
side-channel
25%
Cryptographic Algorithm
25%
Static Random Access Memory
25%
Primary Objective
25%
Error Correction Code
25%
Software Requirements
25%
Industrial Internet of Things
25%