参考文献
[1]张紫楠.物理不可克隆函数的研究与应用[D].解放军信息工程大学,2013.
[2]Maes R.Physically Unclonable Functions.Constructions,Properties and Applications[M].Springer Science&Business Media,2013.
[3]Tuyls P,Schrijen G J,Škoric'B,et al.Read-Proof Hardware from Protective Coatings[C].International Workshop on Cryptographic Hardware and Embedded Systems,2006:369-383.
[4]Guajardo J,Kumar S S,Schrijen G J,et al.Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection[C].International Conference on Field Programmable Logic&Applications,2007:189-195.
[5]Pappu R S.Physical One-way Functions[D].Boston:Massachusetts Institute of Technology,2001.
[6]Bulens P,Standaert F X,Quisquater J J.How to Strongly Link Data and its Medium:the Paper Case[J].IET Information Security,2010,4(3):125-136.
[7]Hammouri G,Dana A,Sunar B.CDs Have Fingerprints Too[C]//Proceedings of the 11th International Workshop on Cryptographic Hardware and Embdded Systems.Berlin:Springer,2009:348-362.
[8]Guajardo J,Koric B,Tuyls P,et al.Anti-counterfeiting,Key Distribution,and Key Storage in an Ambient World via Physical Un-clonable Function[J].Information Systems Frontiers,2009,11(1):19-41.
[9]Lofstrom K,Daasch W R,Taylor D.IC Identification Circuit Using Device Mismatch[C]//Proceedings of Solid-State Circuits Conference.Washington DC:IEEE Computer Society,2000:372-373.
[10]Helinski R,Acharyya D,Plusquellic J.A Physical Unclonable Function Defined Using Power Distribution System Equivalent Resistance Variation[C]//Proceedings of the 46th Annual Design Automation Conference.New York:ACM,2009:676-681.
[11]张紫楠,郭渊博.物理不可克隆函数综述[J].计算机应用,2012,32(11):3115-3120.
[12]Gassend B,Clarke D,Vandijk M,et al.Silicon Physical Random Functions[A].In:ACM Conference on Computer and Communications Security[C].New York USA:ACM,2002:148-160.
[13]Gassend B.Physical Random Functions[D].Massachusetts:Massachusetts Institute of Technology,2003.
[14]Lim D.Extracting Secret Keys from Integrated Circuits[D].Boston:Massachusetts Institute of Technology,2004.
[15]Lee JW,Lim D,Gassend B,et al.A Technique to Build a Secret Key in IntegratedCircuits for Identification and Authentication Application[A].In:Proceedings of the Symposium on VLSI Circuits[C].Honolulu USA:Digest of Technical Papers,2004:176-179.
[16]Ozturk E,Hammouri G,Sunar B.Physical Unclonable Function with Tristate Buffers[A].In:IEEE Symposium on Circuits and Systems[C],2008:3194-3197.
[17]Lin L,Holcomb D,Krishnappa D K,et al.Low-power Sub-threshold Desigh of Secure Physical Unclonable Functions[A].In:ACM IEEE International Symposium on Low Power Electronics and Design[C].2010:43-48.
[18]Majzoobi M,Koushanfar F,Potkonjak M.Techniques for Design and Implementation of Secure Reconfigurable PUFs[J].ACM Transaction on Reconfigurable Technology System,2009,2(1):1-33.
[19]Ruhrmair U,Sehnke F,Solter J,et al.Modeling Attacks on Physical Unclonable Functions[A].In:ACM Conference on Computer and Communications Security[C],2010:237-249.
[20]Guajardo J,Kumar S S,Schrijen G J,et al.FPGA Intrinsic PUFs and Their Use for IP Protection[A].In:Cryptographic Hardware and Embedded Systems Workshop.Vienna Austria:Springer,2007,63-80.
[21]Holcomb DE,Burleson WP,Fu K.Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags[A].In:Proceedings of the Conference on RFID Security[C].Malaga Spain:RFID Publications,2007:11-13.
[22]Maes R,Tuyls P,Verbauwhede I.Intrinsic PUFs from Flip-Flops on Reconfigurable Devices[C]//3rd Benelux Workshop on Information and System Security(WISSec 2008).2008,17:2008.
[23]V van der Leest,Schrijen G J,Handschuh H,et al.Hardware Intrinsic Security from D Flip-flops[A].In:ACM Workshop on Scalable Trusted Computing[C],2010:53-62.
[24]Su Y,Holleman J,Otis B.A 1.6pJ/bit 96% Stable Chip-ID Generating Circuit Using Process Variations[A].In IEEE International Solid-State Circuits Conference[C].Washington DC,IEEE Computer Society,2007:406-611.
[25]Maes R,Tuyls P,Verbauwhede T.Statistical Analysis of Silicon PUF Responses for Device Identification[EB/OL].[2012-03-15].http://www.cosic.esat.kuleuven.be/publications/article-1112.pdf
[26]Bolotnyy L,Robins G.Physically Unclonable Function-based Security and Privacy in RFID System[C]//IEEE International Conference on Pervasive Computing and Communications.Washington DC:IEEE Computer Society,2007:211-220.
[27]Tuyls P,Batina L.RFID-tags for Anti-conterferting[C]//Topics in Cryptology,2006,LNCS 3860.Berlin:Springer,2006:13-17.
[28]Batina L.Guajardo J.Kerins T,et al.Public-key Cryptography for RFID-tags[C]//Pervasive Computing and Communications Workshops.New York:ACM,2007:217-222.