共 11 条
[1]
Bösch C, 2008, LECT NOTES COMPUT SC, V5154, P181, DOI 10.1007/978-3-540-85053-3_12
[2]
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[3]
Controlled Physical Random Functions
[J].
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2002,
:149-160
[4]
Guajardo J, 2007, LECT NOTES COMPUT SC, V4727, P63
[5]
The butterfly PUF protecting IP on every FPGA
[J].
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2008,
:67-+
[6]
A technique to build a secret key in integrated circuits for identification and authentication applications
[J].
2004 SYMPOSIUM ON VLSI CIRCUITS, DIGEST OF TECHNICAL PAPERS,
2004,
:176-179
[7]
Linnartz JP, 2003, LECT NOTES COMPUT SC, V2688, P393
[10]
Tuyls P, 2006, LECT NOTES COMPUT SC, V4249, P369