共 72 条
- [1] Becker G., The gap between promise and reality: On the insecurity of XOR arbiter PUFs, Cryptographic Hardware and Embedded Systems – CHES 2015, (2015)
- [2] Bosch C., Guajardo J., Sadeghi A.-R., Shokrollahi J., Tuyls P., Efficient helper data key extractor on FPGAs, International Workshop on
- [3] Cryptographic Hardware and Embedded Systems, pp. 181-197, (2008)
- [4] Becker G. T., Wild A., Guneysu T., Security analysis of index-based syndrome coding for PUF-based key generation, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 20-25, (2015)
- [5] Chen Q., Csaba G., Lugli P., Schlichtmann U., Ruhrmair U., The Bistable Ring PUF: A New Architecture for Strong Physical Unclonable Functions, IEEE Int. Symposium on Hardware-Oriented Security and Trust, (2011)
- [6] Chen B., Ignatenko T., Willems F. M. J., Maes R., van der Sluis E., Selimis G., A robust SRAM-PUF key generation scheme based on polar codes, GLOBECOM 2017-2017 IEEE Global Communications Conference, pp. 1-6, (2017)
- [7] Delvaux J., Security analysis of PUF-based key generation and entity authentication, (2017)
- [8] Delvaux J., Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs, IEEE Transactions on Information Forensics and Security, 14, 8, pp. 2043-2058, (2019)
- [9] Desset C., Macq B., Vandendorpe L., Block error-correcting codes for systems with a very high BER: Theoretical analysis and application to the protection of watermarks, Signal Processing: Image Communication, 17, 5, pp. 409-421, (2002)
- [10] Dodis Y., Reyzin L., Smith A., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, International conference on the theory and applications of cryptographic techniques, pp. 523-540, (2004)