[1]
GASSEND B,CLARKE D,VANDIJK M,et al.Delay-based circuit authentication and applications[C]// ACM Symposium on Applied Computing. New York:ACM,2003:294-301.
[2]
PAPPU R S.Physical one-way functions[D].Boston: Massachusetts Institute of Technology,2001.
[3]
TUYLS P,SCHRIJEN G J,KORIC B,et al.Read-proof hardware from protective coatings[C]// Cryptographic Hardware and Embedded Systems Workshop. New York:ACM,2006:369-383.
[4]
LIM D.Extracting secret keys from integrated circuits[D].Boston:Massachusetts Institute of Technology,2004.
[5]
LEE JW,LIM D,GASSEND B,et al.A technique to build a secret key in integrated circuits for identification and authentication application[C]// Proceedings of the Symposium on VLSI Circuits. Washington, DC: IEEE Computer Society,2004:176-159.
[6]
KUMAR S,GUAJARDO J,MAES R,et al.The butterfly PUF protecting IP on every FPGA[C]// IEEE International Workshop on Hardware-oriented Security and Trust. Washington, DC: IEEE Computer Society,2008:67-70.
[7]
GUAJARDO J,KUMAR SS,SCHRIJEN G J,et al.FPGA intrinsic PUFs and their use for IP protection[C]// Cryptographic Hardware and Embedded Systems Workshop. Berlin:Springer,2007:63-80.
[8]
HAMMOURI G,OZTURK E,SUNAR B.A tamper-proof and lightweight authentication scheme[J].Pervasive and Mobile Computing,2008,4(6):807-818.
[9]
OZTURK E,HAMMOURI G,SUNAR B.Towards robust low cost authentication for pervasive devices[C]// Proceedings of the Sixth IEEE International Conference on Pervasive Computing and Communication. Washington, DC:IEEE Computer Society,2008:170-178.
[10]
SADEGHI A R,SCHULZ S,WACHSMANN C.Lightweight remote attestation using physical function[C]// Conference on Wireless Network Security. New York:ACM,2011:109-114.
[11]
TUYLS P.BATINA L.RFID-tags for anti-conterferting[C]// Topics in Cryptology,2006,LNCS 3860.Berlin:Springer,2006:13-17.
[12]
BATINA L.GUAJARDO J.KERINS T,et al.Public-key cryptography for RFID-tags[C]// Pervasive Computing and Communications Workshops. New York:ACM,2007:217-222.
[13]
BULENS P,STANDAERT F X,QUISQUATER J J.How to strongly link data and Its medium: the paper case[J]. IET Information Security,2010, 4(3):125-136.
[14]
HAMMOURI G,DANA A,SUNAR B.CDs have fingerprints too[C]// Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems.Berlin:Springer,2009:348-362。
[15]
GUAJARDO J,KORIC B,TUYLS P,et al.Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable function[J]. Information Systems Frontiers,2009,11(1):19-41.
[16]
LOFSTROM K,DAASCH W R,TAYLOR D.IC identification circuit using device mismatch[C]// Proceedings of Solid-State Circuits Conference. Washington, DC: IEEE Computer Society,2000:372-373.
[17]
HELINSKI R,ACHARYYA D,PLUSQUELLIC J.A physical unclonable function defined using power distribution system equivalent resistance variation[C]// Proceedings of the 46th Annual Design Automation Conference.New York:ACM, 2009:676-681.
[18]
PELGROM M,DUINMAIJER A,WELBERS A.Matching properties of mos transistors[J].IEEE Journal of Solid-State Circuits,1989,24(5):1433-1439.
[19]
AGARWAL A,KANG K,BHUNIA S,et al.Device-aware yield-centric dual-VT design under parameter variations in nanoscale technologies[J].IEEE Transactions on Very Large Scale Integration System,2007,15(6):660-671.
[20]
KANAMOTO T,OGASAHARA Y,NATSUME K,et al.Impact of well edge proximity effect on timing[C]// Solid State Circuits Conference, 2007. Washington, DC: IEEE Computer Society,2007:115-118.
[21]
REDA S,NASSIF SR.Analyzing the impact of process variations on parametric measurements: Novel models and applications[C]// Proceedings of the Conference on Design, Automation and Test. Washington, DC: IEEE Computer Society,2009:375-380.
[22]
WESTE N.CMOS VLSI design: a circuits and systems perspective[M]. 4th ed.Boston:Pearson Education,2010.
[23]
GASSEND B,CLARKE D, VANDIJK M,et al.Silicon physical random functions[C]// ACM Conference on Computer and Communications Security.New York:ACM,2002:148-160.
[24]
GASSEND B.Physical random functions[D]. Cambridge,USA:Massachusetts:Massachusetts Institute of Technology,2003.
[25]
SUZUKI D,SHIMIZU K.The glitch puf: A new delay-PUF architecture exploiting glitch shapes[C]// Cryptographic Hardware and Embedded Systems.Berlin:Springer,2010:366-382.
[26]
HOLCOMB D E,BURLESON W P,FU K.Initial SRAM state as a fingerprint and source of true random numbers for RFID tags[C]// Proceedings of the Conference on RFID Security.Malaga,Spain:RFID Publications,2007:11-13.
[27]
MAES R,TUYLS P,VERBAUWHEDE T.Intrinsic PUFs from flip-flops on reconfigurable devices[EB/OL].[2012-03-18]. http://www.cosic.esat.kuleuven.be/publications/article-1173.pdf.
[28]
SU Y,HOLLEMAN J,OTIS B.A 1.6PJ/bit 96 stable chip-ID generating circuit using process variations[C]// IEEE International Solid-State Circuits Conference.Washington,DC:IEEE Computer Society,2007:406-611.
[29]
杨灵, 闫大顺. 基于PUF 的低成本RFID 系统安全协议[J].计算机工程,2010,36(15):148-150,155.
[30]
马昌社,王 涛,王立斌.基于PUF的RFID 协议分析与改进[J].计算机工程,2011,37(21): 249-251.
[31]
MAES R,TUYLS P,VERBAUWHEDE T.Statistical analysis of silicon PUF responses for device identification[EB/OL].[2012-03-15].
http://www.cosic.esat.kuleuven.be/publications/article-1112.pdf
[32]
BOLOTNYY, L,ROBINS G.Physically unclonable function-based security and privacy in RFID system[C]// IEEE International Conference on Pervasive Computing and Communications. Washington, DC: IEEE Computer Society,2007:211-220.
[33]
MAJZOOBI M,KOUSHANFAR F,POTKONJAK M.Techniques for design and implementation of secure reconfigurable PUFS[J]. ACM Transactions on Reconfigurable Technology System,2009,2(1):1-33.
[34]
LIM D,LEE J W,GASSEND B,et al.Extracting secret keys from integrated circuits[J].IEEE Transactions on Very Large Scale Integration System,2005,13 (10):1200-1205.
[35]
RUHRAIR U,SOLTER J,SEHNKE F.On the foundations of physical unclonable functions[EB/OL].[2012-03-18]. http://eprint.iacr.org/2009/277.pdf.
[36]
SUH GE,DEVADAS S.Physical unclonable functions for device authentication and secret key generation[C]// Design Automation Conference.New York:ACM,2007:9-14.
[37]
DODIS Y,OSTROVSKY R,REYZIN L,et al.Fuzzy extractors: How to generate strong keys from biometrics and other noisy data[J].SIAM Journal on Computing,2008,38(1):97-139.
[38]
BOSCH C,GUAJARDO J,SADEGHI AR,et al.Efficient helper data key extractor on FPGA[C]// Workshop on Cryptographic Hardware and Embedded Systems.Berlin:Springer,2008:181-197.
[39]
MAES R,TUYLS P,VERBAUWHEDE T.Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs[C]// Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems. Berlin:Springer,2009:332-347.
[40]
SHANNON C E.Communication theory of secrecy systems[J].Bell Systems Technical Journal,1949,28(4):656-715. |