Publisher
Springer International Publishing
Reference14 articles.
1. Georg T. Becker. “The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs”. In: Cryptographic Hardware and Embedded Systems – CHES 2015. Ed. by Tim Güneysu and Helena Handschuh. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2015, pp. 535–555. isbn: 978-3-662-48324-4.
2. D. Chatterjee, D. Mukhopadhyay, and A. Hazra. “PUF-G: A CAD Framework for Automated Assessment of Provable Learnability from Formal PUF Representations”. In: 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD). Nov. 2020, pp. 1–9.
3. Jeroen Delvaux and Ingrid Verbauwhede. “Side Channel Modeling Attacks on 65nm Arbiter PUFs Exploiting CMOS Device Noise”. In: Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium On. IEEE, 2013, pp. 137–142.
4. Blaise Gassend, Dwaine Clarke, Marten van Dijk, and Srinivas Devadas. “Silicon Physical Random Functions”. In: Proceedings of the 9th ACM Conference on Computer and Communications Security. CCS’02. New York, NY, USA: ACM, 2002, pp. 148–160. isbn: 978-1-58113-612-8. http://doi.acm.org/10.1145/586110.586132 (visited on 10/14/2019).
5. Blaise Gassend, Daihyun Lim, Dwaine Clarke, Marten van Dijk, and Srinivas Devadas. “Identification and Authentication of Integrated Circuits”. In: Concurrency and Computation: Practice and Experience 16.11 (Sept. 2004), pp. 1077–1098. issn: 1532–0634. https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.805 (visited on 09/19/2018).