共 28 条
[1]
Akgun M., 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P473, DOI 10.1109/ARES.2011.73
[2]
[Anonymous], 2001, THESIS MIT
[3]
Aysu A., 2015, LNCS, V9293, P555
[4]
Banks J, 2007, RFID APPLIED, P1, DOI 10.1002/9780470168226
[5]
Bösch C, 2008, LECT NOTES COMPUT SC, V5154, P181, DOI 10.1007/978-3-540-85053-3_12
[6]
Bringer J, 2008, LECT NOTES COMPUT SC, V5229, P77, DOI 10.1007/978-3-540-85855-3_6
[7]
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016,
2016, 9813
:412-431
[8]
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[9]
Dodis Y, 2006, LECT NOTES COMPUT SC, V4117, P232