A 47 F2/bit Charge-Sharing based Sequence-dependent PUF with a Permutative Challenge
暂无分享,去创建一个
[1] Yoonmyung Lee,et al. A 445F2 leakage-based physically unclonable Function with Lossless Stabilization Through Remapping for IoT Security , 2018, 2018 IEEE International Solid - State Circuits Conference - (ISSCC).
[2] Mingoo Seok,et al. Ultra-Compact and Robust Physically Unclonable Function Based on Voltage-Compensated Proportional-to-Absolute-Temperature Voltage Generators , 2016, IEEE Journal of Solid-State Circuits.
[3] Yongki Lee,et al. 8.7 Physically unclonable function for secure key generation with a key error rate of 2E-38 in 45nm smart-card chips , 2016, 2016 IEEE International Solid-State Circuits Conference (ISSCC).
[4] Kui Dai,et al. An Invasive-Attack-Resistant PUF Based On Switched-Capacitor Circuit , 2015, IEEE Transactions on Circuits and Systems I: Regular Papers.
[5] Marcel J. M. Pelgrom,et al. Matching properties of MOS transistors , 1989 .
[6] Chuang Bai,et al. A Reliable Strong PUF Based on Switched-Capacitor Circuit , 2018, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[7] Ron Kapusta,et al. A 16 bit linear passive-charge-sharing SAR ADC in 55nm CMOS , 2016, 2016 IEEE Asian Solid-State Circuits Conference (A-SSCC).
[8] Dai Li,et al. 25.1 A 562F2 Physically Unclonable Function with a Zero-Overhead Stabilization Scheme , 2019, 2019 IEEE International Solid- State Circuits Conference - (ISSCC).
[9] David Blaauw,et al. 8.3 A 553F2 2-transistor amplifier-based Physically Unclonable Function (PUF) with 1.67% native instability , 2017, 2017 IEEE International Solid-State Circuits Conference (ISSCC).
[10] Jeroen Delvaux,et al. Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs , 2019, IEEE Transactions on Information Forensics and Security.
[11] Sudhir Satpathy,et al. A 4-fJ/b Delay-Hardened Physically Unclonable Function Circuit With Selective Bit Destabilization in 14-nm Trigate CMOS , 2017, IEEE Journal of Solid-State Circuits.
[12] Srinivas Devadas,et al. Identification and authentication of integrated circuits , 2004, Concurr. Pract. Exp..
[13] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[14] B. R. Heap. Permutations by Interchanges , 1963, Comput. J..