共 21 条
[1]
Guajardo J., Kumar S.S., Schrijen G.-J., Tuyls P., FPGA intrinsic PUFs and their use for IP protection, Cryptographic Hardware Embedded Systems, pp. 63-80, (2007)
[2]
Guajardo J., Kumar S.S., Schrijen G.-J., Tuyls P., Physical unclonable functions and public-key crypto for FPGA IP protection, International Conference on Field Programmable Logic and Applications, pp. 189-195, (2007)
[3]
Trimberger S.M., Moore J.J., FPGA security: Motivations, features, and applications, Proceedings of the IEEE, 102, 8, pp. 1248-1265, (2014)
[4]
Zhang J., Lin Y., Lyu Y., Qu G., Cheung R.C.C., Che W., Zhou Q., Bian J., FPGA IP protection by binding finite state machine to physical unclonable function, 23rd International Conference on Field Programmable Logic and Applications, pp. 1-4, (2013)
[5]
Herder C., Yu M.-D., Koushanfar F., Devadas S., Physical unclonable functions and applications: A tutorial, Proceedings of the IEEE, 102, 8, pp. 1126-1141, (2014)
[6]
Tuyls P., Skoric B., Strong authentication with PUFs, Security, Privacy and Trust in ModernDataManagement,Data-CentricSystemsandApplications, pp. 133-148, (2007)
[7]
Paral Z., Devadas S., Reliable and efficient PUF-based key generation using pattern matching, IEEE International Symposium on Hardware-Oriented Security Trust San Diego, pp. 128-133, (2011)
[8]
Devadas S., Yu M.D., Secure and robust error correction for physical unclonable functions, IEEE Design and Test of Computers, 27, 1, pp. 48-65, (2010)
[9]
Maes R., Verbauwhede I., Physically unclonable functions: A study on the state of the art and future research directions, Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp. 3-37, (2010)
[10]
Dailey M.D., Authentication Schemes Based on Physically Unclonable Functions, (2009)