PAPPU R, RECHT B, TAYLOR J, et al. Physical one-way functions[J]. Science, 2002, 297(5589): 2026-2030.
|
LIM D, LEE J W, GASSEND B, et al. Extracting secret keys from integrated circuits[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2005, 13(10): 1200-1205.
|
LAO Y J and PARHI K K. Statistical analysis of MUX-based physical unclonable functions[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2014, 33(5): 649-662.
|
CAO Yuan, ZHANG Le, CHANG Chiphong, et al. A low- power hybrid RO PUF with improved thermal stability for lightweight applications[J]. IEEE Transactions on Computer- Aided Design of Integrated Circuits and Systems, 2015, 34(7): 1143-1147.
|
WIECZOREK P Z and GOLOFIT K. Metastability occurrence based physical unclonable functions for FPGAs[J]. Electronics Letters, 2014, 50(4): 281-283.
|
YING S, HOLLEMAN J, and OTIS B P. A digital 1.6 pJ/bit chip identification circuit using process variations[J]. IEEE Journal of Solid-State Circuits, 2008, 41(3): 69-77.
|
HOLCOMB D E, BURLESON W P, and FU K. Power-up SRAM state as an identifying fingerprint and source of true random numbers[J]. IEEE Transactions on Computers, 2009, 58(9): 1198-1210.
|
WANG Pengjun, ZHANG Yuejun, HAN Jun, et al. Architecture and physical implementation of reconfigurable multi-port physical unclonable functions in 65 nm CMOS[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013, E96-A(5): 963-970.
|
ZHANG Le, FONG Xuanyao, CHANG Chiphong, et al. Optimizating emerging nonvolatile memories for dual-mode applications: Data storage and key generator[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015, 34(7): 1176-1187.
|
ZHANG Le, FONG Xuanyao, CHANG Chiphong, et al. Highly reliable spin-transfer torque magnetic RAM-based physical unclonable function with multi-response-bits per cell [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(8): 1630-1642.
|
ZHANG Jiliang, LIN Yaping, LYU Yongqiang, et al. A PUF-FSM binding scheme for FPGA IP protection and pay- per-device licensing[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(6): 1137-1150.
|
项群良, 张培勇, 欧阳冬生, 等. 多频率段物理不可克隆函数[J]. 电子与信息学报, 2012, 34(8): 2007-2012. doi: 10.3724/ SP.J.1146.2011.01249.
|
XIANG Qunliang, ZHANG Peiyong, OUYANG Dongsheng, et al. Multiple frequency slots based physical unclonable functions[J]. Journal of Electronics Information Technology, 2012, 34 (8): 2007-2012. doi: 10.3724/SP.J.1146.2011.01249.
|
BHARGAVE M and MAI K. An efficient reliable PUF-based cryptographic key generator in 65 nm CMOS[C]. Design, Automation and Test in Europe Conference and Exhibition (DATE), Dresden, Germany, 2014: 1-6.
|
GAO Yansong, RANASINGHE D C, AL-SARAWI S F, et al. Memristive crypto primitive for building highly secure physical unclonable functions[J]. Scientific Reports, 2015, 5(12785): 1-14.
|
RUHRMAIR U, SOLTER J, SEHNKE F, et al. PUF modeling attacks on simulated and silicon data[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(11): 1876-1891.
|
SAHOO D P, NGUYEN P H, MUKHOPADHYAY D, et al. A case of lightweight PUF constructions: cryptanalysis and machine learning attacks[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015, 34(8): 1334-1343.
|
WAN Meilin, HE Zhangqing, HAN Shuang, et al. An invasive-attack-resistant PUF based on switched-capacitor circuit[J]. IEEE Transactions on Circuits and Systems I: Regular Papers, 2015, 62(8): 2024-2034.
|
UNGER S H. Hazards, critical races, and metastability[J]. IEEE Transactions on Computers, 1995, 44(6): 754-768.
|
THEODORIDIS G, THEODORIDIS S, SOUDRIS D, et al. Switching activity estimation under real-gate delay using timed Boolean functions[J]. IEE Proceedings-Computers and Digital Techniques, 2000, 147(6): 444-450.
|