A Platform Solution for Secure Supply-Chain and Chip Life-Cycle Management
暂无分享,去创建一个
[1] Morris J. Dworkin,et al. SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .
[2] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[3] Ulrich Rührmair,et al. PUFs at a glance , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[4] Ramesh Karri,et al. A Primer on Hardware Security: Models, Methods, and Metrics , 2014, Proceedings of the IEEE.
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Bruce Schneier,et al. Cryptography Engineering - Design Principles and Practical Applications , 2010 .
[7] Igor L. Markov,et al. Solving the Third-Shift Problem in IC Piracy With Test-Aware Logic Locking , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[8] Ujjwal Guin,et al. Counterfeit Integrated Circuits: Detection and Avoidance , 2015 .
[9] Roel Maes,et al. Physically Unclonable Functions , 2013, Springer Berlin Heidelberg.
[10] Arenberg Doctoral,et al. Physically Unclonable Functions: Constructions, Properties and Applications , 2012 .