共 20 条
- [1] Arora N., 1992, IEEE T ELECTRON DEV, P292
- [2] Beckmann N, 2009, LECT NOTES COMPUT SC, V5806, P206, DOI 10.1007/978-3-642-04431-1_15
- [3] Bohm C., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P269, DOI 10.1109/ICNSS.2011.6060013
- [4] Bojanova I., 2013, INFORM DEV
- [5] Ferguson N., CRYPTOGRAPHY ENG DES
- [6] Filanovsky I., 2001, IEEE T CIRCUITS SYST, P879
- [7] Controlled Physical Random Functions [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 149 - 160
- [8] Guajardo J, 2007, LECT NOTES COMPUT SC, V4727, P63
- [10] Koeberl Patrick, 2012, Trusted Systems. Third International Conference INTRUST 2011. Revised Selected Papers, P271, DOI 10.1007/978-3-642-32298-3_18