共 11 条
[1]
Alkabani Y, 2007, IEEE IC CAD, P674
[2]
Alkabani YM, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P291
[3]
[Anonymous], 2007, 2007 IEEE INT SOLID
[4]
Chakraborty R. S., 2008, P IEEE ACM INT C COM, P674
[5]
Huang JW, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P76, DOI 10.1109/HST.2008.4559056
[6]
Koushanfar Farinaz., 2001, Proceedings of the 4th International Workshop on Information Hiding, IHW '01, P81, DOI DOI 10.1007/3-540-45496-9_7
[7]
The butterfly PUF protecting IP on every FPGA
[J].
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2008,
:67-+
[8]
A technique to build a secret key in integrated circuits for identification and authentication applications
[J].
2004 SYMPOSIUM ON VLSI CIRCUITS, DIGEST OF TECHNICAL PAPERS,
2004,
:176-179
[9]
Lofstrom K., 2000, INT SOLID STATE CIRC, P372
[10]
Roy JA, 2008, DES AUT TEST EUROPE, P948