Jamshid Shokrollahi, and Pim Tuyls. Efficient helper data key extractor on FPGAs, CHES, vol.5154, pp.181-197, 2008. ,
An Easy-to-Design PUF Based on a Single Oscillator: The Loop PUF, 2012 15th Euromicro Conference on Digital System Design, pp.156-162, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00753216
Upper bounds on the min-entropy of RO sum, arbiter, feed-forward arbiter, and S-ArbRO PUFs, IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), pp.1-6, 2016. ,
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, EUROCRYPT, vol.3027, pp.523-540, 2004. ,
, E-safety vehicle intrusion protected applications
Delay-based circuit authentication and applications, Proceedings of the 2003 ACM Symposium on Applied Computing, pp.294-301, 2003. ,
Information technology -security techniques -security requirements, test and evaluation methods for physically unclonable functions for generating nonstored security parameters, 20897. ,
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon, pp.283-301, 2012. ,
PUFKY: A fully functional PUF-based cryptographic key generator, CHES 2012, pp.302-319, 2012. ,
Development of the unified security requirements of PUFs during the standardization process, SecITC, vol.11359, pp.314-330, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02265318
Tables for computing bivariate normal probabilities, The Annals of Mathematical Statistics, vol.27, issue.4, pp.1075-1090, 1956. ,
On the entropy of physically unclonable functions, 2016 IEEE International Symposium on Information Theory (ISIT), pp.2928-2932, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-02288459
An improved analysis of reliability and entropy for delay PUFs, DSD, pp.553-560, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02288537
Entropy estimation of physically unclonable functions via Chow parameters, 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp.698-704, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02300791
Robust key extraction from physical uncloneable functions, Applied Cryptography and Network Security, vol.3531, pp.407-422, 2005. ,
Recombination of physical unclonable functions, 35th Annual GOMACTech Conference, 2010. ,