[1] LIU Weiqiang,CUI Yijun,WANG Chenghua.Design and implementation of a low-cost physical unclonable function and its application in RFID[J].Acta Electronica Sinica,2016,44(7):1772-1776.(in Chinese) 刘伟强,崔益军,王成华.一种低成本物理不可克隆函数结构的设计实现及其RFID应用[J].电子学报,2016,44(7):1772-1776. [2] LIU Boya,ZHANG Yue,YANG Yatao,et al.Lightweight mutual authentication protocol based on PUF function[J].Computer Engineering,2019,45(2):38-41,52.(in Chinese) 刘博雅,张悦,杨亚涛,等.基于PUF函数的轻量级双向认证协议[J].计算机工程,2019,45(2):38-41,52. [3] MANAMI S,REI U,NAOFUMI H,et al.Efficient fuzzy extractors based on ternary debiasing method for biased physically unclonable functions[J].IEEE Transactions on Circuits and Systems I:Regular Papers,2019,66(2):616-629. [4] YANG Jianxi,ZHANG Yue,CHI Yaping,et al.Design of cell reselection security protocol based on physical unclonable function[J].Computer Engineering,2018,44(11):154-157,164.(in Chinese) 杨建喜,张悦,池亚平,等.基于物理不可克隆函数的小区重选安全协议设计[J].计算机工程,2018,44(11):154-157,164. [5] PANG Zihan,ZHOU Qiang,GAO Wenchao,et al.Hardware implementation of physical unclonable function on FPGAs[J].Journal of Computer-Aided Design & Computer Graphics,2017,29(9):1590-1603.(in Chinese) 庞子涵,周强,高文超,等.FPGA物理不可克隆函数及其实现技术[J].计算机辅助设计与图形学学报,2017,29(9):1590-1603. [6] DODIS Y,OSTROVSKY R,REYZIN L,et al.Fuzzy extractors:how to generate strong keys from biometrics and other noisy data[J].SIAM Journal on Computing,2008,38(1):97-139. [7] MAES R,VAN HERREWEGE A,VERBAUWHEDE I.PUFKY:a fully functional PUF-based cryptographic key generator[C]//Proceedings of the 14th International Conference on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2012:302-319. [8] LIU Wenchao,LU Zhaojun,LIU Hailong,et al.A novel security key generation method for SRAM PUF based on fourier analysis[J].IEEE Access,2018,6:49576-49587. [9] VAN H A,KATZENBEISSER S,MAES R,et al.Reverse fuzzy extractors:enabling lightweight mutual authentication for PUF-enabled RFIDs[M].Berlin,Germany:Springer,2012:374-389. [10] EIROA S,CASTRO J,MARTINEZ-RODRIGUEZ M C,et al.Reducing bit flipping problems in SRAM physical unclonable functions for chip identification[C]//Proceedings of the 19th IEEE International Conference on Electronics,Circuits,and Systems.Washington D.C.,USA:IEEE Press,2012:392-395. [11] YU M D,DEVADAS S.Secure and robust error correction for physical unclonable functions[J].IEEE Design & Test of Computers,2010,27(1):48-65. [12] RAHMAN M T,HOSEY A,GUO Z M,et al.Systematic correlation and cell neighborhood analysis of SRAM PUF for robust and unique key generation[J].Journal of Hardware and Systems Security,2017,1(2):137-155. [13] GAO Y S,SU Y,XU L,et al.Lightweight (reverse) fuzzy extractor with multiple reference PUF responses[J].IEEE Transactions on Information Forensics and Security,2019,14(7):1887-1901. [14] SUTAR S,RAHA A,RAGHUNATHAN V.Memory-based combination PUFs for device authentication in embedded systems[J].IEEE Transactions on Multi-Scale Computing Systems,2018,4(4):793-810. [15] GAO Yansong,SU Yang,YANG Wei,et al.Building secure SRAM PUF key generators on resource constrained devices[C]//Proceedings of 2019 IEEE International Conference on Pervasive Computing and Communications Workshops.Washington D.C.,USA:IEEE Press,2019:912-917. [16] MAES R,LEEST V,SLUIS E,et al.Secure key generation from biased PUFs[M].Berlin,Germany:Springer,2015:517-534. [17] DELVAUX J,GU D W,VERBAUWHEDE I,et al.Efficient fuzzy extraction of PUF-induced secrets:theory and applications[M].Berlin,Germany:Springer,2016:412-431. [18] WAN Chao.Design and realization of the security outline of zero information leakage based on PUF[D].Chengdu:University of Electronic Science and Technology of China,2018.(in Chinese)万超.基于PUF的零信息泄露的安全概略的设计与实现[D].成都:电子科技大学,2018. [19] JEROEN D.Security analysis of PUF-based key generation and entity authentication[D].Shanghai:Shanghai Jiaotong University,2017.(in Chinese) JEROEN D.基于PUF密钥生成和实体认证的安全性分析[D].上海:上海交通大学,2017. [20] LEEST V,PRENEEL B,SLUIS E.Soft decision error correction for compact memory-based PUFs using a single enrollment[C]//Proceedings of the 14th International Conference on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2012:268-282. [21] BECKER G T.Robustfuzzy extractors and helper data manipulation attacks revisited:theory versus practice[J].IEEE Transactions on Dependable and Secure Computing,2019,16(5):783-795. |