PAC learning of arbiter PUFs
暂无分享,去创建一个
[1] Frederik Armknecht,et al. A Formalization of the Security Features of Physical Functions , 2011, 2011 IEEE Symposium on Security and Privacy.
[2] I. Miller. Probability, Random Variables, and Stochastic Processes , 1966 .
[3] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[4] Frank Sehnke,et al. On the Foundations of Physical Unclonable Functions , 2009, IACR Cryptol. ePrint Arch..
[5] Miodrag Potkonjak,et al. Techniques for Design and Implementation of Secure Reconfigurable PUFs , 2009, TRETS.
[6] Farinaz Koushanfar,et al. Rapid FPGA delay characterization using clock synthesis and sparse sampling , 2010, 2010 IEEE International Test Conference.
[7] Ahmad-Reza Sadeghi,et al. Enhancing RFID Security and Privacy by Physically Unclonable Functions , 2009, Towards Hardware-Intrinsic Security.
[8] Jeroen Delvaux,et al. Fault Injection Modeling Attacks on 65 nm Arbiter and RO Sum PUFs via Environmental Changes , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.
[9] Avner Kornfeld,et al. Estimation of FMAX and ISB in microprocessors , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[10] Ingrid Verbauwhede,et al. Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions , 2010, Towards Hardware-Intrinsic Security.
[11] Umesh V. Vazirani,et al. An Introduction to Computational Learning Theory , 1994 .
[12] Georg T. Becker,et al. On the Pitfalls of Using Arbiter-PUFs as Building Blocks , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[13] Dawu Gu,et al. A Survey on Lightweight Entity Authentication with Strong PUFs , 2015, ACM Comput. Surv..
[14] Jeroen Delvaux,et al. Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible II , 2014, IACR Cryptol. ePrint Arch..
[15] Srinivas Devadas,et al. FPGA PUF using programmable delay lines , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[16] Ingrid Verbauwhede,et al. Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[17] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).
[18] Berk Sunar,et al. A tamper-proof and lightweight authentication scheme , 2008, Pervasive Mob. Comput..
[19] François-Xavier Standaert,et al. Strong PUFs and their (physical) unpredictability: a case study with power PUFs , 2013, WESS '13.
[20] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[21] Boris Skoric,et al. Robust Key Extraction from Physical Uncloneable Functions , 2005, ACNS.
[22] Shai Ben-David,et al. Understanding Machine Learning: From Theory to Algorithms , 2014 .
[23] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[24] Jeroen Delvaux,et al. Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[25] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[26] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[27] Srinivas Devadas,et al. PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.
[28] Ulrich Rührmair,et al. Combined Modeling and Side Channel Attacks on Strong PUFs , 2013, IACR Cryptol. ePrint Arch..
[29] Dana Angluin,et al. Learning Regular Sets from Queries and Counterexamples , 1987, Inf. Comput..
[30] Rajesh Parekh,et al. A Polynominal Time Incremental Algorithm for Learning DFA , 1998, ICGI.
[31] HammouriGhaith,et al. A tamper-proof and lightweight authentication scheme , 2008 .
[32] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[33] Roel Maes,et al. Physically Unclonable Functions , 2013, Springer Berlin Heidelberg.
[34] John G. Proakis,et al. Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..
[35] Arenberg Doctoral,et al. Physically Unclonable Functions: Constructions, Properties and Applications , 2012 .
[36] Srinivas Devadas,et al. Identification and authentication of integrated circuits , 2004, Concurr. Pract. Exp..
[37] Jean-Pierre Seifert,et al. Physical Characterization of Arbiter PUFs , 2014, IACR Cryptol. ePrint Arch..
[38] Sally A. Goldman,et al. Computational Learning Theory , 2010, Lecture Notes in Computer Science.