Computer Science ›› 2016, Vol. 43 ›› Issue (Z11): 373-376.doi: 10.11896/j.issn.1002-137X.2016.11A.086
Previous Articles Next Articles
XU Tai-zhong, YANG Tian-chi, CHENG Juan and SHAO Qi-feng
[1] 胡丽辉,张建泉,李楠,等.带内存保护的FreeRTOS在TMS570上的移植[J].单片机与嵌入式系统应用,2015,5(2):63-66 [2] 李龙谱,斯雪明,张志鸿,等.在多FPGA上实现基于字典的ZIP文档口令恢复[J].计算机应用与软件,2015,32(6):292-295 [3] 李浪,李仁发,童元满,等.嵌入式加密芯片功耗分析攻击与防御研究进展[J].计算机研究与发展,2010,7(4):595-604 [4] Pappu R,Recht B,Taylor J,et al.Physical one-way functions[J].Science,2001,297(5589):2026-2030 [5] Devadas S,Suh E,et al.Design and implementation of PUF-based ‘unclonable’ RFID ICs for anti-counterfeiting and security applications[C]∥IEEE International Conference on RFID.2008:58-64 [6] Machida T,Yamamoto D,et al.A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA[J].Proceedings of the 2014 Federated Conference on Computer Science and Information Systems,2014,2(3):871-878 [7] Kumar S S,Guajardo J,et al.Extended abstract:the butterfly PUF protecting IP on every FPGA[C]∥IEEE International Workshop on Hardware Oriented Security and Trust.2008:67-70 [8] Tuyls P,et al.Read-proof hardware from protective coatings[C]∥8th International Workshop,Vokohama,Janpan.October 10-13,2006:369-383 [9] Cao Yuan,Zhang Le,et al.A low-power hybrid RO PUF with improved thermal stability for lightweight applications[J].IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems,2015,34(7):1143-1147 [10] Masato T G C,Mitsuru S,et al.A stable key generation fromPUF responses with a fuzzy extractor for cryptographic authentications[C]∥IEEE Global Conference on Consumer Electro-nics.2013:525-527 [11] Guajardo J,Kumar S S,Schrijen G J,et al.FPGA Intrinsic PUFs and Their Use for IP Protection[M].Cryptographic Hardware and Embedded Systems-CHES 2007.Springer Berlin Heidelberg,2007:63-80 [12] 李晖,夏伟,邓冠阳,等.PUF-HB#:轻量级RFID双向认证协议[J].北京邮电大学学报,2013,36(6):13-17 [13] Majzoobi M,Rostami M,et al.Devadsa S.Slender PUF protocol:A light weight,robust,and secure authentication by substring matching[J].IEEE Symposium on Security and Privacy Workshops,2012:33-44 [14] 向学哲,马昌社.基于PPUF的高效RFID隐私认证协议[J].华南师范大学学报,2013,45(1):42-46 [15] Canteaut A,Chaband F.A New Algorithm for Finding Mini-mun-weight Words in a Linear Code:Application to McEliece’s Cryptosystem and to BCH codes of length 511[J].IEEE Tran-sactions on Information Theory,2010,44(1):367-378 [16] Hori Y,Yoshida T,et al.Quantitative and Statistical Perfor-mance Evaluation of Arbiter Physical Unclonable Functions on FPGAs[C]∥2010 International Conference on Reconfigurable Computing and FPGAS,Cancun,Quintana Roo,Mexico,13-15 December 2010:115-120 |
No related articles found! |
|