共 31 条
[1]
Bishop C.M., Nasrabadi N.M., Pattern recognition and machine learning, (2006)
[2]
Delvaux J., Verbauwhede I., Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise, HOST, (2013)
[3]
Delvaux J., Verbauwhede I., Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation, IACR Cryptology ePrint Archive, (2013)
[4]
Delvaux J., Verbauwhede I., Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation, IACR Cryptology ePrint Archive, (2013)
[5]
Delvaux J., Verbauwhede I., Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes, IACR Cryptology ePrint Archive, (2013)
[6]
Devadas S., Physical unclonable functions and secure processors, CHES 2009. LNCS, 5747, (2009)
[7]
Gassend B., Clarke D., Van Dijk M., Devadas S., Silicon physical random functions, ACM Conference on Computer and Communications Security, pp. 148–160, (2002)
[8]
Helfmeier C., Nedospasov D., Boit C., Seifert J.-P., Cloning Physically Unclonable Functions, HOST 2013, (2013)
[9]
Lim D., Extracting Secret Keys from Integrated Circuits, (2004)
[10]
Majzoobi M., Koushanfar F., Devadas S., FPGA PUF using programmable delay lines, IEEEWorkshop Information Forensics and Security, WIFS, (2010)