|
[1]B.Halak, M.Zwolinski, and M. S.Mispan, “Overview of PUF-Based hardware security solutions for the internet of things, in Proc. Midwest Symp. Circuits Syst., no. October, pp. 1–4, 2017. [2]Y.Lee, Y.Park, and D.Kim, “Security threats analysis and considerations for internet of things, in Proc. 8th Int. Conf. Secur. Technol. SecTech 2015, pp. 28–30, 2016. [3]J. C.Talwana and H. J.Hua, “Smart World of Internet of Things (IoT) and Its Security Concerns, in Proc. 2016 IEEE Int. Conf. Internet Things; IEEE Green Comput. Commun. IEEE Cyber, Phys. Soc. Comput. IEEE Smart Data, iThings-GreenCom-CPSCom-Smart Data 2016, pp. 240–245, 2017. [4]R.Maes, “Physically Unclonable Functions: Constructions, Properties and Applications, Kathol. Univ. Leuven, Belgium, 2012. [5]C. H.Chang, Y.Zheng, and L.Zhang, “A Retrospective and a Look Forward: Fifteen Years of Physical Unclonable Function Advancement, IEEE Circuits Syst. Mag., vol. 17, no. 3, pp. 32–62, 2017. [6]C.Herder, M. D.Yu, F.Koushanfar, and S.Devadas, “Physical unclonable functions and applications: A tutorial, in Proc. IEEE, vol. 102, no. 8, pp. 1126–1141, 2014. [7]J. W.Lee, Daihyun Lim, B.Gassend, G. E.Suh, M.vanDijk, and S.Devadas, “A technique to build a secret key in integrated circuits for identification and authentication applications, pp. 176–179, 2004. [8]A.Maiti, V.Gunreddy, and P.Schaumont, “A systematic method to evaluate and compare the performance of physical unclonable functions, Embed. Syst. Des. with FPGAs, vol. 9781461413, pp. 245–267, 2013. [9]G. E.Suh and S.Devadas, “Physical Unclonable Functions for Device Authentication and Secret Key Generation, 44th ACM/IEEE Des. Autom. Conf., pp. 9–14, 2007. [10]R.Kumar and W.Burleson, “On design of a highly secure PUF based on non-linear current mirrors, in Proc. IEEE Int. Symp. Hardware-Oriented Secur. Trust. HOST 2014, pp. 38–43, 2014. [11]S.Lin, Y.Cao, X.Zhao, X.Wang, and X.Pan, “A compact ultra-low power physical unclonable function based on time-domain current difference measurement, in Proc. - IEEE Int. Symp. Circuits Syst., vol. 2016–July, pp. 277–280, 2016. [12]Z.Wang et al., “Current Mirror Array: A Novel Circuit Topology for Combining Physical Unclonable Function and Machine Learning, IEEE Trans. Circuits Syst. I Regul. Pap., vol. 65, no. 4, pp. 1314–1326, 2018. [13]Y.Cao, C.Chang, W.Zheng, and X.Zhao, “A Sub-pico Joules Per Bit Robust Physical Unclonable Function Based on Subthreshold Voltage References, in Proc. - 2018 IEEE Int. Symp. Circuits Syst. (ISCAS), Florence, Italy, 2018, pp. 1-5., pp. 1–5, 2018. [14]I.Lee, D.Sylvester, and D.Blaauw, “A subthreshold voltage reference with scalable output voltage for low-power IoT systems, IEEE J. Solid-State Circuits, vol. 52, no. 5, pp. 1443–1449, 2017. [15]A.Almansouri, A.Alturki, A.Alshehri, T.Al-Attar, and H.Fariborzi, “Improved StrongARM latch comparator: Design, analysis and performance evaluation, in Proc. PRIME 2017 - 13th Conf. PhD Res. Microelectron. Electron. Proc., pp. 89–92, 2017. [16]S.Hashemi and B.Razavi, “Analysis of metastability in pipelined ADCs, IEEE J. Solid-State Circuits, vol. 49, no. 5, pp. 1198–1209, 2014. [17]L.Chen, A.Sanyal, J.Ma, X.Tang, and N.Sun, “Comparator common-mode variation effects analysis and its application in SAR ADCs, in Proc. IEEE Int. Symp. Circuits Syst., vol. 2016–July, pp. 2014–2017, 2016.
|