PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator, International Workshop on Cryptographic Hardware and Embedded Systems, pp.302-319, 2012. ,
DOI : 10.1007/978-3-642-33027-8_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.464.9735
Complementary IBS: Application specific error correction for PUFs, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, pp.1-6, 2012. ,
DOI : 10.1109/HST.2012.6224310
Low-Area Reed Decoding in a Generalized Concatenated Code Construction for PUFs, 2015 IEEE Computer Society Annual Symposium on VLSI, pp.143-148, 2015. ,
DOI : 10.1109/ISVLSI.2015.31
Experimental quantum cryptography, Journal of Cryptology, vol.5, issue.1, pp.3-28, 1992. ,
DOI : 10.1007/bf00191318
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.3599
Secret-Key Reconciliation by Public Discussion, EUROCRYPT, pp.410-423, 1993. ,
DOI : 10.1007/3-540-48285-7_35
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.42.9686
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs, International Conference on Financial Cryptography and Data Security, pp.374-389, 2012. ,
DOI : 10.1007/978-3-642-32946-3_27
Building the Fabless/Foundry Business Model [Guest Editorial], IEEE Solid-State Circuits Magazine, vol.3, issue.4, pp.7-44, 2011. ,
DOI : 10.1109/MSSC.2011.942447
Counterfeit chips on the rise, IEEE Spectrum, vol.49, issue.6, pp.16-17, 2012. ,
DOI : 10.1109/MSPEC.2012.6203952
Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain, Proceedings of the IEEE, vol.102, issue.8, pp.1207-1228, 2014. ,
DOI : 10.1109/JPROC.2014.2332291
Survey of hardware protection of design data for integrated circuits and intellectual properties, IET Computers & Digital Techniques, vol.8, issue.6, pp.274-287, 2014. ,
DOI : 10.1049/iet-cdt.2014.0028
URL : https://hal.archives-ouvertes.fr/ujm-01180551
A Survey on Lightweight Entity Authentication with Strong PUFs, ACM Computing Surveys, vol.48, issue.2, 2015. ,
DOI : 10.1109/WiCOM.2012.6478482
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.692.1717
From secured logic to IP protection, Microprocessors and Microsystems, vol.47, pp.44-54, 2016. ,
DOI : 10.1016/j.micpro.2016.02.010
URL : https://hal.archives-ouvertes.fr/hal-01280195
PRESENT: an ultralightweight block cipher, International Workshop on Cryptographic Hardware and Embedded Systems, pp.450-466, 2007. ,
DOI : 10.1007/978-3-540-74735-2_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.2536
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.34, issue.6, pp.889-902, 2015. ,
DOI : 10.1109/TCAD.2014.2370531
Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs, International Workshop on Cryptographic Hardware and Embedded Systems, pp.332-347, 2009. ,
DOI : 10.1007/978-3-642-04138-9_24
Efficient Helper Data Key Extractor on FPGAs, International Workshop on Cryptographic Hardware and Embedded Systems, pp.181-197, 2008. ,
DOI : 10.1007/978-3-540-85053-3_12
Cherry-Picking Reliable PUF Bits With Differential Sequence Coding, IEEE Transactions on Information Forensics and Security, vol.11, issue.9, pp.2065-2076, 2016. ,
DOI : 10.1109/TIFS.2016.2573766
Systematic Low Leakage Coding for Physical Unclonable Functions, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, pp.155-166, 2015. ,
DOI : 10.1006/jcss.1996.0004
Demystifying the information reconciliation protocol CASCADE, Quantum Information & Computation, vol.15, issue.5&6, pp.453-477, 2015. ,
An information reconciliation protocol for secret-key agreement with small leakage, 2015 IEEE International Symposium on Information Theory (ISIT), pp.730-734, 2015. ,
DOI : 10.1109/ISIT.2015.7282551
URL : http://oa.upm.es/37659/1/INVE_MEM_2015_201720.pdf
A large scale characterization of RO-PUF, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.94-99, 2010. ,
DOI : 10.1109/HST.2010.5513108
Experimental evaluation of Physically Unclonable Functions in 65 nm CMOS, 2012 Proceedings of the ESSCIRC (ESSCIRC), pp.486-489, 2012. ,
DOI : 10.1109/ESSCIRC.2012.6341361
A PUF Based on a Transient Effect Ring Oscillator and Insensitive to Locking Phenomenon, IEEE Transactions on Emerging Topics in Computing, vol.2, issue.1, pp.30-36, 2014. ,
DOI : 10.1109/TETC.2013.2287182
URL : https://hal.archives-ouvertes.fr/hal-00961503
Enhanced TERO-PUF implementations and characterization on FPGAs, International Symposium on Field-Programmable Gate Arrays, p.282, 2016. ,
DOI : 10.1145/2847263.2847298
URL : https://hal.archives-ouvertes.fr/hal-01285993
Design, Evaluation, and Optimization of Physical Unclonable Functions Based on Transient Effect Ring Oscillators, IEEE Transactions on Information Forensics and Security, vol.11, issue.6, pp.1291-1305, 2016. ,
DOI : 10.1109/TIFS.2016.2524666
URL : https://hal.archives-ouvertes.fr/hal-01279172
FPGA Intrinsic PUFs and Their Use for IP Protection, International Workshop on Cryptographic Hardware and Embedded Systems, pp.63-80, 2007. ,
DOI : 10.1007/978-3-540-74735-2_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1029.6180
End-toend design of a PUF-based privacy preserving authentication protocol, International Workshop on Cryptographic Hardware and Embedded Systems, 2015. ,
A soft decision helper data algorithm for SRAM PUFs, 2009 IEEE International Symposium on Information Theory, pp.2101-2105, 2009. ,
DOI : 10.1109/ISIT.2009.5205263
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.325.1032
Comparison of SRAM and FF PUF in 65nm Technology, Nordic Conference on Secure IT Systems, pp.47-64, 2011. ,
DOI : 10.1007/978-3-642-29615-4_5
A probabilistic analysis of CASCADE, International conference on quantum cryptography, 2014. ,
Leftover Hash Lemma, Revisited, Annual Cryptology Conference, pp.1-20, 2011. ,
DOI : 10.1007/978-3-642-22792-9_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.2366
spongent: A Lightweight Hash Function, International Workshop on Cryptographic Hardware and Embedded Systems, pp.312-325, 2011. ,
DOI : 10.1007/978-3-642-23951-9_21
LFSR-based Hashing and Authentication, Annual International Cryptology Conference, pp.129-139, 1994. ,
DOI : 10.1007/3-540-48658-5_15
Analysis and design of active IC metering schemes, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.74-81, 2009. ,
DOI : 10.1109/HST.2009.5224964
Privacy Amplification by Public Discussion, SIAM Journal on Computing, vol.17, issue.2, pp.210-229, 1988. ,
DOI : 10.1137/0217014
Error Detection and Authentication in Quantum Key Distribution, Australasian Conference on Information Security and Privacy, pp.260-273, 2001. ,
DOI : 10.1007/3-540-47719-5_22
Cryptography from Learning Parity with Noise, 38th Conference on Current Trends in Theory and Practice of Computer Science, ? Spindler?v Ml´ynMl´yn, Czech Republic, pp.99-114, 2012. ,
DOI : 10.1007/3-540-48329-2_2
On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, pp.384-386, 1978. ,
DOI : 10.1109/TIT.1978.1055873
Key-recovery attacks on various RO PUF constructions via helper data manipulation, Design, Automation & Test in Europe Conference, pp.1-6, 2014. ,
DOI : 10.7873/date.2014.085
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6917
An Accurate Probabilistic Reliability Model for Silicon PUFs, International Workshop on Cryptographic Hardware and Embedded Systems, pp.73-89, 2013. ,
DOI : 10.1007/978-3-642-40349-1_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.6086