Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
Well done!
You have completed (UPI) Chapter 16: Emerging Technologies in Cybersecurity!
Instruction
16.4.5 PUF-Based Key Distribution for Code-Based Cryptography
<style> sub { vertical-align: sub; font-size: 70%; } sup { vertical-align: super; font-size: 70%; } </style>
An example of a protocol to generate key pairs with PUFs for code-based cryptography is shown in Figure 9. This protocol is similar to the one presented above for lattice cryptography. Like NTRU, the only source of randomness is Seed K, which is generated from ...