Delay based Physical Unclonable Function for Hardware Security and Trust
暂无分享,去创建一个
[1] Yier Jin,et al. Introduction to Hardware Security , 2015, Electronics.
[2] Tsuyoshi Murata,et al. {m , 1934, ACML.
[3] Marcian N. Cirstea,et al. Analysis and Evaluation of PUF-Based SoC Designs for Security Applications , 2016, IEEE Transactions on Industrial Electronics.
[4] Srinivas Devadas,et al. Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.
[5] Yu Zhuang,et al. An experimental study of the state-of-the-art PUFs implemented on FPGAs , 2017, 2017 IEEE Conference on Dependable and Secure Computing.
[6] Akashi Satoh,et al. Quantitative and Statistical Performance Evaluation of Arbiter Physical Unclonable Functions on FPGAs , 2010, 2010 International Conference on Reconfigurable Computing and FPGAs.
[7] K. Harish,et al. Malicious Circuit Detection for Improved Hardware Security , 2015, SSCC.
[8] Ramesh Bhakthavatchalu,et al. Implementing delay based physically unclonable functions on FPGA , 2016, 2016 International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).
[9] Srinivas Devadas,et al. Security Based on Physical Unclonability and Disorder , 2012 .
[10] Roel Maes. Physically Unclonable Functions: Concept and Constructions , 2013 .
[11] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).
[12] M. Nirmala Devi,et al. Malicious hardware detection and design for trust: An analysis , 2017 .
[13] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.