1. Martin Albrecht , Lorenzo Grassi , Christian Rechberger , Arnab Roy , and Tyge Tiessen . 2016 . MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. In Int. Conf. on the Theory and Application of Cryptology and Information Security. Springer, 191--219 . Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, and Tyge Tiessen. 2016. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. In Int. Conf. on the Theory and Application of Cryptology and Information Security. Springer, 191--219.
2. IoT Analytics. 2022. State of IoT 2022: Number of connected IoT devices growing 18% to 14.4 billion globally. https://iot-analytics.com/number-connected-iot-devices/ IoT Analytics. 2022. State of IoT 2022: Number of connected IoT devices growing 18% to 14.4 billion globally. https://iot-analytics.com/number-connected-iot-devices/
3. Aydin Aysu Ege Gulcan Daisuke Moriyama Patrick Schaumont and Moti Yung. 2015. End-to-end design of a PUF-based privacy preserving authentication protocol. In Cryptographic Hardware and Embedded Systems (CHES). 556--576. Aydin Aysu Ege Gulcan Daisuke Moriyama Patrick Schaumont and Moti Yung. 2015. End-to-end design of a PUF-based privacy preserving authentication protocol. In Cryptographic Hardware and Embedded Systems (CHES). 556--576.
4. Georg T Becker. 2015. The gap between promise and reality: On the insecurity of XOR arbiter PUFs. In Cryptographic Hardware and Embedded Systems (CHES). 535--555. Georg T Becker. 2015. The gap between promise and reality: On the insecurity of XOR arbiter PUFs. In Cryptographic Hardware and Embedded Systems (CHES). 535--555.
5. Eli Ben-Sasson , Alessandro Chiesa , Eran Tromer , and Madars Virza . 2014 . Succinct {Non-Interactive} Zero Knowledge for a von Neumann Architecture . In 23rd USENIX Security Symposium (USENIX Security 14) . 781--796. Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct {Non-Interactive} Zero Knowledge for a von Neumann Architecture. In 23rd USENIX Security Symposium (USENIX Security 14). 781--796.