How do the Arbiter PUFs Sample the Boolean Function Class?
暂无分享,去创建一个
[1] Claude Carlet,et al. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts , 2016, EUROCRYPT.
[2] Stefan Katzenbeisser,et al. Physically Uncloneable Functions in the Universal Composition Framework , 2011, CRYPTO.
[3] Ulrich Rührmair,et al. Strong PUFs: Models, Constructions, and Security Proofs , 2010, Towards Hardware-Intrinsic Security.
[4] Claude Carlet,et al. Boolean functions with restricted input and their robustness; application to the FLIP cipher , 2017, IACR Trans. Symmetric Cryptol..
[5] Pantelimon Stanica,et al. Analysis of the Strict Avalanche Criterion in Variants of Arbiter-Based Physically Unclonable Functions , 2019, INDOCRYPT.
[6] Frank Sehnke,et al. On the Foundations of Physical Unclonable Functions , 2009, IACR Cryptol. ePrint Arch..
[7] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[8] Cunsheng Ding,et al. On the nonlinearity of Boolean functions with restricted input , 2018, Cryptography and Communications.
[9] Miodrag Potkonjak,et al. Testing Techniques for Hardware Security , 2008, 2008 IEEE International Test Conference.
[10] Srinivas Devadas,et al. Security Based on Physical Unclonability and Disorder , 2012 .
[11] Srini Devadas. Physical Unclonable Functions and Secure Processors , 2009, CHES.
[12] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[13] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[14] Georg T. Becker,et al. The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs , 2015, CHES.
[15] Pantelimon Stanica,et al. Tools in Analyzing Linear Approximation for Boolean Functions Related to FLIP , 2018, INDOCRYPT.
[16] Srinivas Devadas,et al. PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.
[17] Blaise L. P. Gassend,et al. Physical random functions , 2003 .
[18] Pantelimon Stanica,et al. Analysis on Boolean Function in a Restricted (Biased) Domain , 2020, IEEE Transactions on Information Theory.
[19] Berk Sunar,et al. PUF-HB: A Tamper-Resilient HB Based Authentication Protocol , 2008, ACNS.
[20] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).
[21] Anne Canteaut,et al. Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression , 2016, Journal of Cryptology.