共 21 条
- [11] A technique to build a secret key in integrated circuits for identification and authentication applications [J]. 2004 SYMPOSIUM ON VLSI CIRCUITS, DIGEST OF TECHNICAL PAPERS, 2004, : 176 - 179
- [12] Maes R, 2012, LECT NOTES COMPUT SC, V7428, P302, DOI 10.1007/978-3-642-33027-8_18
- [13] Majzoobi M., 2012, 2012 IEEE CS Security and Privacy Workshops (SPW 2012), P33, DOI 10.1109/SPW.2012.30
- [14] Paral Z., 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), P128, DOI 10.1109/HST.2011.5955010
- [17] Modeling Attacks on Physical Unclonable Functions [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 237 - 249
- [18] Physical unclonable functions for device authentication and secret key generation [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 9 - +
- [19] Design and implementation of the AEGIS single-chip secure processor using physical random functions [J]. 32ND INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, PROCEEDINGS, 2005, : 25 - 36
- [20] Van Herrewege A., 2012, P INT C FIN CRYPT DA, P374