A fair and comprehensive large-scale analysis of oscillation-based PUFs for FPGAs
暂无分享,去创建一个
[1] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[2] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[3] Daniel E. Holcomb,et al. Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags , 2007 .
[4] Chi-En Daniel Yin,et al. LISA: Maximizing RO PUF's secret extraction , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[5] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[6] Tim Güneysu,et al. Security analysis of index-based syndrome coding for PUF-based key generation , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[7] Ulrich Rührmair,et al. The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[8] Dawu Gu,et al. Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[9] Patrick Schaumont,et al. A large scale characterization of RO-PUF , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[10] Tim Güneysu,et al. On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[11] Sylvain Guilley,et al. An Easy-to-Design PUF Based on a Single Oscillator: The Loop PUF , 2012, 2012 15th Euromicro Conference on Digital System Design.
[12] Jorge Guajardo,et al. Extended abstract: The butterfly PUF protecting IP on every FPGA , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[13] Lilian Bossuet,et al. Design and Characterization of the TERO-PUF on SRAM FPGAs , 2016, 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
[14] Lilian Bossuet,et al. A PUF Based on a Transient Effect Ring Oscillator and Insensitive to Locking Phenomenon , 2014, IEEE Transactions on Emerging Topics in Computing.
[15] Ingrid Verbauwhede,et al. PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator , 2012, CHES.
[16] Srinivas Devadas,et al. FPGA PUF using programmable delay lines , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[17] Srinivas Devadas,et al. Lightweight and Secure PUF Key Storage Using Limits of Machine Learning , 2011, CHES.
[18] Jean-Pierre Seifert,et al. Let Me Prove It to You: RO PUFs Are Provably Learnable , 2015, ICISC.