共 12 条
[2]
Amini E., 2018, J. Hardw. Syst. Secur, V2, P345, DOI [10.1007/s41635-018-0052-3, DOI 10.1007/S41635-018-0052-3]
[3]
Boit C., 2018, TCHES
[4]
Controlled Physical Random Functions
[J].
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2002,
:149-160
[5]
Helfmeier C., 2013, Proceedings of the 2013 ACM SIGSAC Conference on Computer Communications Security, P733
[6]
Kiyan T., 2018, INT S TEST FAIL AN I
[7]
No Place to Hide: Contactless Probing of Secret Data on FPGAs
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016,
2016, 9813
:147-167
[9]
Peterson E., 2015, WP468 XIL INC
[10]
Skorobogatov S P, 2005, SEMIINVASIVE ATTACK