共 30 条
- [21] Morozov S, 2010, LECT NOTES COMPUT SC, V5992, P382, DOI 10.1007/978-3-642-12133-3_37
- [22] Efficient power and timing side channels for physical unclonable functions [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 476 - 492
- [23] PUFs in Security Protocols: Attack Models and Security Evaluations [J]. 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, : 286 - 300
- [24] Modeling Attacks on Physical Unclonable Functions [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 237 - 249
- [26] Simpson E, 2006, LECT NOTES COMPUT SC, V4249, P311
- [27] Physical unclonable functions for device authentication and secret key generation [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 9 - +
- [28] On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2015, 2015, 9440 : 17 - 31
- [29] Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 267 - 285
- [30] Zhou GX, 2014, Arxiv, DOI [arXiv:1412.1885, DOI 10.48550/ARXIV.1412.1885]