Publisher
Springer Science and Business Media LLC
Reference55 articles.
1. Fang D, Qian Y, Hu RQ. A flexible and efficient authentication and secure data transmission scheme for iot applications. IEEE Internet Things J. 2020;7(4):3474–84.
2. Sengupta Anirban, Kundu Sandip. Guest editorial securing iot hardware: threat models and reliable, low-power design solutions. IEEE Trans Very Large Scale Integr VLSI Syst. 2017;25(12):3265–7.
3. Vai M, Nahill B, Kramer J, Geis M, Utin D, Whelihan D, Khazan R. Physical unclonable functions for iot security. In Proc. IEEE High Perform. Extreme Comput. Conf.(HPEC), pages 1–5, 2015.
4. Wendt JB, Potkonjak M. Hardware obfuscation using puf-based logic. In 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pages 270–271. IEEE, 2014.
5. Quadir Enamul, Shahed Md, Chandy John A. Key generation for hardware obfuscation using strong pufs. Cryptography. 2019;3(3):17.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis;Cryptography;2023-11-01
2. Ephemeral Key-based Hybrid Hardware Obfuscation;2022 19th International Bhurban Conference on Applied Sciences and Technology (IBCAST);2022-08-16