[1] Rührmair U,Holcomb D.PUFs at a glance[A].Proceedings of Design,Automation and Test in Europe[C].Dresden,Germany:IEEE,2014.1-6.
[2] Maes R.Physically Unclonable Functions:Constructions,Properties and Applications[M].Berlin Heidelberg:Springer,2013.
[3] Pappu R,Recht B,Taylor J,et al.Physical one-way functions[J].Science, 2002,297(5589):2026-2030.
[4] Gassend B.Physical Random Functions[D].USA:Massachusetts Institute of Te chnology,2003.
[5] Herder C,Yu M,Koushanfar F,et al.Physical unclonable functions and applic ations:A tutorial[J].Proceedings of the IEEE,2014,102(8):1126-1141.
[6] 王晨旭,韩良,等.一种适用于RFID标签的安全化密码算法实现[J].电子学报,2014,42(8):1465-1473. Wang Chen-xu,Han Liang,et al.A secure cipher implementation suitable for RFID-tags[J].Acta Electronica Sinica,2014,42(8):1465-1473.(in Chinese)
[7] Hell M,Johansson T,Maximov A,et al.A stream cipher proposal:Grain-128[A].Proceedings of IEEE International Symposium on Information Theory[C].Se attle,WA,USA:IEEE,2006.1614-1618.
[8] Yu M,Devadas S.Secure and robust error correction for physical unclonable fu nctions[J].IEEE Design & Test of Computers,2010,27(1):48-65.
[9] Merli D,Stumpf F,Eckert C.Improving the quality of ring oscillator PUFs on FPGAs[A].Proceedings of the 5th ACM Workshop on Embedded Systems Security[C].Scottsdale,AZ,USA:ACM,2010.1873548-1873557.
[10] 郭奕旻,李顺东,等.一种轻量级隐私保护的RFID群组证明协议[J].电子学报,2015,43(2):289-292. Guo Yi-min,Li Shun-dong,et al.A lightweight privacy-preser ving grouping proof protocol for RFID systems[J].Acta Electronica Sinica,2015,43(2):289-292.(in Chinese)
[11] 李辉,侯义斌,黄樟钦,刘宏珍,何坚,陈锐.一种智能攻击模型在RFID防伪协议中的研究[J].电子学报,2009,37(11):2565-2573. Li Hui,Hou Yi-bin,Huang Zhang-qin,Liu Hong-zhen,He Jian,Chen Rui.Research on the attack model for RFID anti-counterfeit protocol[J].Acta Electronica S inica,2009,37(11):2565-2573.(in Chinese)
[12] Lee J,Lim D,Gassed B,et al.A technique to build a secret key in integrated circuits for identification and authentication application[A].Proceedings of the Symposium on VLSI Circuits[C].Honolulu,HI,USA:IEEE,2004.176-159.
[13] Suh G,O'Donnell C,Sachdev I,et al.Design and implementation of the AEGI S single-chip secure processor using physical random functions[A].Proceedings of the 32nd International Symposium on Computer Architecture[C].Madison,W I,USA:IEEE,2005.25-36.
[14] Su Y,Holleman J,Otis B.A digital 1.6pJ/bit chip identification circuit us ing process variations[J].IEEE Journal of Solid-State Circuits,2008, 43(1):69-77.
[15] Yu M,M'Raihi D,Sowell R,et al.Lightweight and secure PUF key storage using limits of machine learning[A].Proceedings of Workshop on Cryptographic Har dware and Embedded Systems (CHES)[C].Nara,Japan:ACM,2011.358-373.
[16] Suh G,O'Donnell C,Devadas S.AEGIS:A single-chip secure processor[J]. Information Security Technical Report,2005,10(2):63-73.
[17] Devadas S,Yu M.Secure and robust error correction for physical unclonable functions[J].IEEE Design & Test of Computers,2010,27(1):48-65. |