On the Systematic Drift of Physically Unclonable Functions Due to Aging
暂无分享,去创建一个
[1] Ahmad-Reza Sadeghi,et al. Short paper: lightweight remote attestation using physical functions , 2011, WiSec '11.
[2] Boris Skoric,et al. Bias-based modeling and entropy analysis of PUFs , 2013, TrustED '13.
[3] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[4] Boris Skoric,et al. The Spammed Code Offset Method , 2014, IEEE Transactions on Information Forensics and Security.
[5] Boris Skoric,et al. Secure Key Storage with PUFs , 2007 .
[6] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[7] Ingrid Verbauwhede,et al. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions , 2010, Towards Hardware-Intrinsic Security.
[8] Stefan Katzenbeisser,et al. Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs , 2012, Financial Cryptography.
[9] Ulrich Rührmair,et al. Strong PUFs: Models, Constructions, and Security Proofs , 2010, Towards Hardware-Intrinsic Security.