A formalization of the security features of physical functions, Security and Privacy (SP), 2011 IEEE Symposium on, pp.397-412, 2011. ,
Physically unclonable function-based security and privacy in RFID systems, Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications. pp. 211220. PERCOM '07, 2007. ,
,
A ring oscillator-based PUF with enhanced challenge-response pairs, Canadian Journal of Electrical and Computer Engineering, vol.39, issue.2, pp.174-180, 2016. ,
Logically reconfigurable PUFs: Memory-based secure key storage, Proceedings of the Sixth ACM Workshop on Scalable Trusted Computing, pp.59-64, 2011. ,
Silicon physical random functions, Proceedings of the 9th ACM conference on Computer and communications security, pp.148-160, 2002. ,
, Machine learning attacks on 65nm arbiter PUFs: Accurate modeling poses strict bounds on usability, pp.37-42, 2012.
HMAC: Keyed-hashing for message, 1997. ,
SMTP service extension for authentication RFC 2195, 1999. ,
Physical one-way functions, Science, vol.297, issue.5589, pp.2026-2030, 2002. ,
Strong PUFs: models, constructions, and security proofs. In: Towards hardware-intrinsic security, pp.79-96, 2010. ,
Modeling attacks on physical unclonable functions, Proceedings of the 17th ACM conference on Computer and communications security, pp.237-249, 2010. ,
Buskeeper PUFs, a promising alternative to D flip-flop PUFs, Hardware-Oriented Security and Trust (HOST), 2012 IEEE International Symposium on, pp.7-12, 2012. ,
Physical unclonable functions for device authentication and secret key generation, Proceedings of the 44th annual Design Automation Conference, pp.9-14, 2007. ,