Extracting Secret Keys from Integrated Circuits, 2004. ,
Testing Techniques for Hardware Security, 2008 IEEE International Test Conference, pp.1-10, 2008. ,
DOI : 10.1109/TEST.2008.4700636
Modeling attacks on physical unclonable functions, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.237-249, 2010. ,
Physical One-Way Functions, 2001. ,
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting, 2007. ,
DOI : 10.1007/978-1-84628-984-2
Silicon physical random functions, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.148-160, 2002. ,
DOI : 10.1145/586110.586132
Physical unclonable functions for device authentication and secret key generation, DAC, pp.9-14, 2007. ,
Lightweight secure PUFs, 2008 IEEE/ACM International Conference on Computer-Aided Design, pp.670-673, 2008. ,
DOI : 10.1109/ICCAD.2008.4681648
The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes, CHES, pp.366-382, 2010. ,
DOI : 10.1007/978-3-642-15031-9_25
FPGA Intrinsic PUFs and Their Use for IP Protection, CHES, Lecture Notes in Computer Science, pp.63-80, 2007. ,
DOI : 10.1007/978-3-540-74735-2_5
The Butterfly PUF: Protecting IP on every FPGA, pp.67-70, 2008. ,
Controlled physical random functions, Computer Security Applications Conference Proceedings. 18th Annual, pp.149-160, 2002. ,
Semiinvasive EM attack on FPGA RO PUFs and countermeasures, Proceedings of the Workshop on Embedded Systems Security, pp.1-2, 2011. ,
DOI : 10.1145/2072274.2072276
FPGA PUF using programmable delay lines, 2010 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2010. ,
DOI : 10.1109/WIFS.2010.5711471
Quantitative and Statistical Performance Evaluation of Arbiter Physical Unclonable Functions on FPGAs, 2010 International Conference on Reconfigurable Computing and FPGAs, pp.298-303, 2010. ,
DOI : 10.1109/ReConFig.2010.24
Performance evaluation of physically unclonable function by delay statistics, NEWCAS, 2011. ,
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, SIAM Journal on Computing, vol.38, issue.1, pp.97-139, 2008. ,
DOI : 10.1137/060651380