Author:
Suresh Vyshak,Manimegalai R.
Reference20 articles.
1. Atallah, M.J., Bryant, E.D., Korb, J.T., Rice, J.R.: Binding software to specific native hardware in a VM environment: the PUF challenge and opportunity. In: Proceedings of the 1st ACM Workshop on Virtual Machine Security, pp. 45–48. ACM (2008)
2. Böhm, C., Hofer, M.: Physical Unclonable Functions in Theory and Practice. Springer, New York (2012).
https://doi.org/10.1007/978-1-4614-5040-5
3. Chen, B., Ignatenko, T., Willems, F., Maes, R., van der Sluis, E., Selimis, G.: A robust SRAM-PUF key generation scheme based on polar codes (2017)
4. Chen, B., Ignatenko, T., Willems, F.M., Maes, R., van der Sluis, E., Selimis, G.: High-rate error correction schemes for SRAM-PUFs based on polar codes. arXiv preprint
arXiv:1701.07320
(2017)
5. Delvaux, J., Gu, D., Schellekens, D., Verbauwhede, I.: Helper data algorithms for puf-based key generation: overview and analysis. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6), 889–902 (2015)