共 32 条
[1]
A Formal Foundation for the Security Features of Physical Functions
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:397-412
[2]
Becker G. T., 2014, IACR Cryptol. ePrint Arch., P287
[3]
Becker G.T, 2015, IEEE T COMPUT AID D, P1
[4]
Brzuska C, 2011, LECT NOTES COMPUT SC, V6841, P51, DOI 10.1007/978-3-642-22792-9_4
[5]
chameleon Project, 2015, CHAM MIN
[6]
Delvaux J, 2013, 6 IEEE INT S HARDW O
[7]
Secure lightweight entity authentication with strong PUFs: Mission impossible?
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2014, 8731
:451-475
[8]
Controlled Physical Random Functions
[J].
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2002,
:149-160
[9]
Guajardo J, 2007, LECT NOTES COMPUT SC, V4727, P63
[10]
Using Data Contention in Dual-ported Memories for Security Applications
[J].
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY,
2012, 67 (01)
:15-29