共 30 条
- [1] Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
- [2] A Machine Learning-based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things [J]. 2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, : 49 - 56
- [3] The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 535 - 555
- [4] Brandi G., 2018, THESIS LUISS G CARLI
- [5] Cao XW, 2018, Arxiv, DOI arXiv:1712.09520
- [6] Why Attackers Win: On the Learnability of XOR Arbiter PUFs [J]. TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 22 - 39
- [7] Controlled Physical Random Functions [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 149 - 160
- [8] Glorot X., 2010, PROC AISTAT, P249
- [10] Hastad J., 1989, INT C AUTOMATA LANGU, P451