共 20 条
[1]
Arora N., 1992, IEEE T ELECTRON DEV, P292
[2]
Beckmann N, 2009, LECT NOTES COMPUT SC, V5806, P206, DOI 10.1007/978-3-642-04431-1_15
[3]
Bohm C., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P269, DOI 10.1109/ICNSS.2011.6060013
[4]
Bojanova I., 2013, INFORM DEV
[5]
Ferguson N., CRYPTOGRAPHY ENG DES
[6]
Filanovsky I., 2001, IEEE T CIRCUITS SYST, P879
[7]
Controlled Physical Random Functions
[J].
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2002,
:149-160
[8]
Guajardo J, 2007, LECT NOTES COMPUT SC, V4727, P63
[10]
Koeberl Patrick, 2012, Trusted Systems. Third International Conference INTRUST 2011. Revised Selected Papers, P271, DOI 10.1007/978-3-642-32298-3_18