共 41 条
[11]
Ruhrmair U., Solter J., Sehnke F., Et al., PUFmodeling attacks on simulated and silicon data, IEEE Transactions on Information Forensics & Security, 8, 11, pp. 1876-1891, (2013)
[12]
Tobisch J., Becker G.T., On the scaling of machine learning attacks on PUFs with application to noise bifurcation, International Workshop on Radio Frequency Identification: Security and Privacy Issues, pp. 17-31, (2015)
[13]
Ye J., Guo Q., Hu Y., Li H., Li X., Modeling attacks on strong physical unclonable functions strengthened by random number and weak PUF, 2018 IEEE 36th VLSI Test Symposium, pp. 1-6, (2018)
[14]
Ruhrmair U., Holcomb D.E., PUFs at a glance, Proceedings of Design, Automation & Test in Europe Conference & Exhibition, pp. 1-6, (2014)
[15]
Ganji F., Tajik S., Fabetaler F., Et al., Strong machine learning attack against PUFs with no mathematical model, Proceedings of Cryptographic Hardware and Embedded Systems, pp. 389-411, (2016)
[16]
Guo Q., Ye J., Gong Y., Et al., Efficientattack on non-linear current mirror PUF with genetic algorithm, Asian Test Symposium, pp. 49-54, (2016)
[17]
Vijayakumar A., Patil V.C., Prado C.B., Et al., Machine learning resistant strong PUF: possible or a pipe dream?, IEEE International Symposium on Hardware Oriented Security and Trust, pp. 19-24, (2016)
[18]
Herrewege A.V., Katzenbeisser S., Maes R., Et al., Reversefuzzy extractors: enabling lightweight mutual authentication for PUF-enabled RFIDs, Financial Cryptography and Data Security, pp. 374-389, (2012)
[19]
Majzoobi M., Rostami M., Koushanfar F., Et al., Slender PUF protocol: a lightweight, robust, and secure authentication by substring matching, Proceedings of IEEE Symposium on Security and Privacy Workshops, pp. 33-44, (2012)
[20]
Gassend B., Clarke D., Dijk M.V., Et al., Controlled physical random functions, Proceedings of Computer Security Applications Conference, pp. 149-160, (2007)