4.5 Article

Introducing Recurrence in Strong PUFs for Enhanced Machine Learning Attack Resistance

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions

Anita Aghaie et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Homogeneous and Heterogeneous Feed-Forward XOR Physical Unclonable Functions

S. V. Sandeep Avvaru et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Automation & Control Systems

Memristor-Based Echo State Network With Online Least Mean Square

Shiping Wen et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2019)

Article Engineering, Electrical & Electronic

A 2.86-TOPS/W Current Mirror Cross-Bar-Based Machine-Learning and Physical Unclonable Function Engine For Internet-of-Things Applications

Yi Chen et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2019)

Proceedings Paper Computer Science, Theory & Methods

A 0.16pJ/bit Recurrent Neural Network Based PUF for Enhanced Machine Learning Atack Resistance

Nimesh Shah et al.

24TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC 2019) (2019)

Article Engineering, Electrical & Electronic

Current Mirror Array: A Novel Circuit Topology for Combining Physical Unclonable Function and Machine Learning

Zheng Wang et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2018)

Proceedings Paper Engineering, Electrical & Electronic

A Physical Unclonable Function based on Capacitor Mismatch in a Charge-Redistribution SAR-ADC

Qianying Tang et al.

2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS) (2018)

Article Engineering, Electrical & Electronic

Static Physically Unclonable Functions for Secure Chip Identification With 1.9-5.8% Native Bit Instability at 0.6-1 V and 15 fJ/bit in 65 nm

Anastacia B. Alvarez et al.

IEEE JOURNAL OF SOLID-STATE CIRCUITS (2016)

Proceedings Paper Computer Science, Theory & Methods

Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA

Durga Prasad Sahoo et al.

2016 WORKSHOP ON FAULT AND TOLERANCE IN CRYPTOGRAPHY (FDTC) (2016)

Article Computer Science, Information Systems

A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication

Meng-Day (Mandel) Yu et al.

IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS (2016)

Proceedings Paper Computer Science, Information Systems

Why Attackers Win: On the Learnability of XOR Arbiter PUFs

Fatemeh Ganji et al.

TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015 (2015)

Article Computer Science, Information Systems

Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching

Masoud Rostami et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2014)

Article Computer Science, Theory & Methods

PUF Modeling Attacks on Simulated and Silicon Data

Ulrich Ruehrmair et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Information Systems

Reservoir computing approaches to recurrent neural network training

Mantas Lukosevicius et al.

COMPUTER SCIENCE REVIEW (2009)

Article Computer Science, Software Engineering

Identification and authentication of integrated circuits

B Gassend et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2004)