共 37 条
- [1] Aghaie A., 2021, IACR T CRYPTOGRAPH H, V2021, P520, DOI [10.46586/tches.v2021.i3.520-551, DOI 10.46586/TCHES.V2021.I3.520-551]
- [2] Alkatheiri MS, 2017, 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, P181, DOI 10.1109/DESEC.2017.8073845
- [3] A Machine Learning-based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things [J]. 2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, : 49 - 56
- [5] The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 535 - 555
- [6] Chatterjee D., 2021, SACRED ATTACK FRAMEW
- [7] Chatterjee D, 2020, ICCAD-IEEE ACM INT
- [9] Delvaux J, 2013, 2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P137, DOI 10.1109/HST.2013.6581579
- [10] Strong Machine Learning Attack Against PUFs with No Mathematical Model [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 391 - 411