共 21 条
[11]
A technique to build a secret key in integrated circuits for identification and authentication applications
[J].
2004 SYMPOSIUM ON VLSI CIRCUITS, DIGEST OF TECHNICAL PAPERS,
2004,
:176-179
[12]
Maes R, 2012, LECT NOTES COMPUT SC, V7428, P302, DOI 10.1007/978-3-642-33027-8_18
[13]
Majzoobi M., 2012, 2012 IEEE CS Security and Privacy Workshops (SPW 2012), P33, DOI 10.1109/SPW.2012.30
[14]
Paral Z., 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), P128, DOI 10.1109/HST.2011.5955010
[17]
Modeling Attacks on Physical Unclonable Functions
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:237-249
[18]
Physical unclonable functions for device authentication and secret key generation
[J].
2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2,
2007,
:9-+
[19]
Design and implementation of the AEGIS single-chip secure processor using physical random functions
[J].
32ND INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, PROCEEDINGS,
2005,
:25-36
[20]
Van Herrewege A., 2012, P INT C FIN CRYPT DA, P374