Logically reconfigurable PUFs, Proceedings of the sixth ACM workshop on Scalable trusted computing, STC '11, pp.59-64, 2011. ,
DOI : 10.1145/2046582.2046594
The arbiter-PUF with high uniqueness utilizing novel arbiter circuit with Delay-Time Measurement, 2011 IEEE International Symposium of Circuits and Systems (ISCAS), pp.2325-2328, 2011. ,
DOI : 10.1109/ISCAS.2011.5938068
Controlled Physical Random Functions, IEEE Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC02), 2002. ,
DOI : 10.1007/978-1-84628-984-2_14
Identification and authentication of integrated circuits, Concurrency and Computation: Practice and Experience, p.1610771098, 2004. ,
DOI : 10.1002/cpe.805
Hardware-Anchored Security Based on SRAM PUFs, Part 1. Security Privacy, IEEE, vol.10, issue.3, pp.80-83, 2012. ,
DOI : 10.1109/msp.2012.68
URL : https://www.cosic.esat.kuleuven.be/publications/article-2274.pdf
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs, Financial Cryptography and Data Security, pp.374-389, 2012. ,
DOI : 10.1007/978-3-642-32946-3_27
Protection Profile for PUF-Based Devices, Proceedings of the 29th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, IFIP SEC 2014, pp.91-98, 2014. ,
DOI : 10.1007/978-3-642-55415-5_8
URL : https://hal.archives-ouvertes.fr/hal-01370357
Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions, Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp.3-37, 2010. ,
DOI : 10.1007/978-3-642-14452-3_1
Testing Techniques for Hardware Security, 2008 IEEE International Test Conference, pp.1-10, 2008. ,
DOI : 10.1109/TEST.2008.4700636
Modeling attacks on physical unclonable functions, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.237-249, 2010. ,
Cryptanalysis of Electrical PUFs via Machine Learning Algorithms, 2009. ,