Novel strong PUF based on nonlinearity of MOSFET subthreshold operation
暂无分享,去创建一个
[1] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[2] Sani R. Nassif,et al. Design for Manufacturability and Statistical Design - A Constructive Approach , 2007, Series on integrated circuits and systems.
[3] Marcel J. M. Pelgrom,et al. Matching properties of MOS transistors , 1989 .
[4] Leyla Nazhandali,et al. A Highly Stable Leakage-Based Silicon Physical Unclonable Functions , 2011, 2011 24th Internatioal Conference on VLSI Design.
[5] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).
[6] H. Wong,et al. CMOS scaling into the nanometer regime , 1997, Proc. IEEE.
[7] Jorge Guajardo,et al. Extended abstract: The butterfly PUF protecting IP on every FPGA , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[8] Daniel E. Holcomb,et al. Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags , 2007 .
[9] Miodrag Potkonjak,et al. Lightweight secure PUFs , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[10] W. R. Daasch,et al. IC identification circuit using device mismatch , 2000, 2000 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No.00CH37056).
[11] Jorge Guajardo,et al. Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays , 2007, ISSE.
[12] Srinivas Devadas,et al. Identification and authentication of integrated circuits , 2004, Concurr. Pract. Exp..
[13] Ingrid Verbauwhede,et al. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions , 2010, Towards Hardware-Intrinsic Security.
[14] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[15] Ali Chehab,et al. A sub-threshold SRAM based PUF , 2010, 2010 International Conference on Energy Aware Computing.
[16] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[17] Franco Maloberti,et al. Analog Design for CMOS VLSI Systems , 2001 .
[18] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[19] Patrick Schaumont,et al. A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions , 2011, IACR Cryptol. ePrint Arch..
[20] Chih-Jen Lin,et al. LIBLINEAR: A Library for Large Linear Classification , 2008, J. Mach. Learn. Res..
[21] Sani R. Nassif,et al. Ultra-low power current-based PUF , 2011, 2011 IEEE International Symposium of Circuits and Systems (ISCAS).
[22] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[23] Srinivas Devadas,et al. Identification and authentication of integrated circuits: Research Articles , 2004 .
[24] Yu Cao,et al. New paradigm of predictive MOSFET and interconnect modeling for early circuit simulation , 2000, Proceedings of the IEEE 2000 Custom Integrated Circuits Conference (Cat. No.00CH37044).
[25] Yu Cao,et al. New generation of predictive technology model for sub-45nm design exploration , 2006, 7th International Symposium on Quality Electronic Design (ISQED'06).
[26] Akashi Satoh,et al. Quantitative and Statistical Performance Evaluation of Arbiter Physical Unclonable Functions on FPGAs , 2010, 2010 International Conference on Reconfigurable Computing and FPGAs.
[27] Lane Brooks,et al. Circuits and algorithms for pipelined ADCs in scaled CMOS technologies , 2008 .
[28] Miodrag Potkonjak,et al. Testing Techniques for Hardware Security , 2008, 2008 IEEE International Test Conference.
[29] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.