共 37 条
[1]
Aghaie A., 2021, IACR Trans. on Crypt. Hardware and Embedded Systems, P520
[2]
Alkatheiri MS, 2017, 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, P181, DOI 10.1109/DESEC.2017.8073845
[3]
A Machine Learning-based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things
[J].
2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT),
2018,
:49-56
[5]
The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015,
2015, 9293
:535-555
[6]
Chatterjee D., 2021, SACRED ATTACK FRAMEW
[7]
Chatterjee D, 2020, ICCAD-IEEE ACM INT
[9]
Delvaux J, 2013, 2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P137, DOI 10.1109/HST.2013.6581579
[10]
Strong Machine Learning Attack Against PUFs with No Mathematical Model
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016,
2016, 9813
:391-411