共 21 条
[1]
[Anonymous], 2006, Elements of Information Theory
[2]
[Anonymous], 2003, THESIS
[3]
Bösch C, 2008, LECT NOTES COMPUT SC, V5154, P181, DOI 10.1007/978-3-540-85053-3_12
[4]
Design and implementation of PUF-based "Unclonable" RFID ICs for anti-counterfeiting and security applications
[J].
2008 IEEE INTERNATIONAL CONFERENCE ON RFID,
2008,
:58-+
[5]
Dodis Y., 2008, FUZZY EXTRACTORS GEN
[6]
Controlled Physical Random Functions
[J].
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2002,
:149-160
[7]
Guajardo J, 2007, LECT NOTES COMPUT SC, V4727, P63
[8]
Holcomb D.E., 2007, C RFID SEC
[9]
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[10]
Krawczyk H., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P129