D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007.
DOI : 10.1109/SP.2007.36

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.467

A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann et al., PRESENT: An Ultra-Lightweight Block Cipher, CHES, pp.450-466, 2007.
DOI : 10.1007/978-3-540-74735-2_31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.2536

R. S. Chakraborty, F. G. Wolff, S. Paul, C. A. Papachristou, and S. Bhunia, MERO: A Statistical Approach for Hardware Trojan Detection, Clavier and Gaj [4], pp.396-410
DOI : 10.1007/978-3-642-04138-9_28

S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola et al., Design and implementation of PUF-based unclonableRFID ICs for anti-counterfeiting and security applications, IEEE International Conference on RFID, pp.58-64, 2008.

D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. Van-dijk et al., Extracting secret keys from integrated circuits, IEEE Trans. VLSI Syst, vol.13, issue.10, pp.1200-1205, 2005.

L. Lin, M. Kasper, T. Güneysu, C. Paar, and W. Burleson, Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering, Clavier and Gaj [4], pp.382-395
DOI : 10.1007/978-3-642-04138-9_27

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.182.904

D. Merli, F. Stumpf, and C. Eckert, Improving the quality of ring oscillator PUFs on FPGAs, Proceedings of the 5th Workshop on Embedded Systems Security, WESS '10, 2010.
DOI : 10.1145/1873548.1873557

S. Morozov, A. Maiti, and P. Schaumont, An Analysis of Delay Based PUF Implementations on FPGA, Lecture Notes in Computer Science, vol.5992, pp.382-387, 2010.
DOI : 10.1007/978-3-642-12133-3_37

E. Ozturk, G. Hammouri, and B. Sunar, Physical unclonable function with tristate buffers, 2008 IEEE International Symposium on Circuits and Systems, pp.3194-3197, 2008.
DOI : 10.1109/ISCAS.2008.4542137

C. Paar, T. Eisenbarth, M. Kasper, T. Kasper, and A. Moradi, Keeloq and sidechannel analysis-evolution of an attack, Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009.

R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, Physical One-Way Functions, Science, vol.297, issue.5589, pp.2026-2030, 2002.
DOI : 10.1126/science.1074376

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.6166

T. Popp, M. Kirschbaum, and S. Mangard, Practical Attacks on Masked Hardware, Lecture Notes in Computer Science, vol.90, issue.1, pp.211-225, 2009.
DOI : 10.1007/3-540-45760-7_6

U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas et al., Modeling attacks on physical unclonable functions, ACM Conference on Computer and Communications Security, pp.237-249, 2010.

G. J. Simmons, The Prisoners??? Problem and the Subliminal Channel, CRYPTO, pp.51-67, 1983.
DOI : 10.1007/978-1-4684-4730-9_5