Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007. ,
DOI : 10.1109/SP.2007.36
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.467
PRESENT: An Ultra-Lightweight Block Cipher, CHES, pp.450-466, 2007. ,
DOI : 10.1007/978-3-540-74735-2_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.2536
MERO: A Statistical Approach for Hardware Trojan Detection, Clavier and Gaj [4], pp.396-410 ,
DOI : 10.1007/978-3-642-04138-9_28
Design and implementation of PUF-based unclonableRFID ICs for anti-counterfeiting and security applications, IEEE International Conference on RFID, pp.58-64, 2008. ,
Extracting secret keys from integrated circuits, IEEE Trans. VLSI Syst, vol.13, issue.10, pp.1200-1205, 2005. ,
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering, Clavier and Gaj [4], pp.382-395 ,
DOI : 10.1007/978-3-642-04138-9_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.182.904
Improving the quality of ring oscillator PUFs on FPGAs, Proceedings of the 5th Workshop on Embedded Systems Security, WESS '10, 2010. ,
DOI : 10.1145/1873548.1873557
An Analysis of Delay Based PUF Implementations on FPGA, Lecture Notes in Computer Science, vol.5992, pp.382-387, 2010. ,
DOI : 10.1007/978-3-642-12133-3_37
Physical unclonable function with tristate buffers, 2008 IEEE International Symposium on Circuits and Systems, pp.3194-3197, 2008. ,
DOI : 10.1109/ISCAS.2008.4542137
Keeloq and sidechannel analysis-evolution of an attack, Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009. ,
Physical One-Way Functions, Science, vol.297, issue.5589, pp.2026-2030, 2002. ,
DOI : 10.1126/science.1074376
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.6166
Practical Attacks on Masked Hardware, Lecture Notes in Computer Science, vol.90, issue.1, pp.211-225, 2009. ,
DOI : 10.1007/3-540-45760-7_6
Modeling attacks on physical unclonable functions, ACM Conference on Computer and Communications Security, pp.237-249, 2010. ,
The Prisoners??? Problem and the Subliminal Channel, CRYPTO, pp.51-67, 1983. ,
DOI : 10.1007/978-1-4684-4730-9_5