[1] PAPPU R, RECHT B, TAYLOR J,et al.Physical one-way functions[J]. Science,2002,297(5589): 2026-2030.
[2] ROSTAMI M, MAJZOOBI M, KOUSHANFAR F,et al.Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching[J]. IEEE Transactions on Emerging Topics in Computing, 2014,2(1): 37-49.
[3] LIN L, SRIVATHSA S, KRISHNAPPA D K,et al. Design and validation of arbiter-based PUFs for sub-45-nm low-power security applications[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(4): 1394-1403.
[4] ZHANG Yue-jun,WANG Peng-jun, ZHANG Xue-long,et al. A PUFs-based hardware authentication BLAKE algorithm in 65nm CMOS[J]. International Journal of Electronics, 2016, 103(6): 1056-1066.
[5] WANG Peng-jun, ZHANG Yue-jun, HAN Jun,et al.Architecture and physical implementation of reconfigurable multi-Port physical unclonable functions in 65nm CMOS[J].IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013, E96-A(5): 963-970.
[6] MAITI A, INYOUNG K, SCHAUMONT P.A robust physicalunclonable function with enhanced challenge-response set[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 333-345.
[7] LI Jing, LU Xiao-dong, MA Mao-fen, et al.Optical color image encryption in diffraction imaging scheme based on spectrum fusion[J]. Acta Photonica Sinica, 2015, 44 (7): 0710002.
[8] LIU Yu-jia, XU Xi-ping, XU Jia-hong,et al. Remote sensing image encryption using vector operations and secondary image phase masks[J]. Acta Photonica Sinica,2019,48(2): 0210002.
[9] ARPPE R, SRENSEN T J. Physical unclonable functions generated through chemical methods for anti-counterfeiting[J]. Nature Reviews Chemistry, 2017, 1(4): 1-13.
[10] HU Z Y, JOSE MM, COMERAS L, et al.Physically unclonable cryptographic primitives using self-assembled carbon nanotubes[J].Nature Nanotechnology, 2016, 11(6): 559-565.
[11] ROBERTS J, BAGCI I E, ZAWAWI M A M,et al.Using quantum confinement to uniquely identify devices [J]. Scientific Reports, 2015, 5: 1-8.
[12] ZHANG J, LIN Y, LYU Y,et al.A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing [J].IEEE Transactions on Information Forensics and Security, 2015, 10(6): 1137-1150.
[13] YEH C H, SUNG P Y, KUO C H,et al.Robust laser speckle recognition system for authenticity identification[J].Optics Express, 2012, 20(22): 24382-24393.
[14] HORSTMEYER R, JUDKEWITZ B, VELLEKOOP I M,et al.Physical key-protected one-time pad [J]. Scientific Reports, 2013, 3: 1-6.
[15] NAKAYAMA K, OHTSUBO J. Optical security device providing fingerprint and designed pattern indicator using fingerprint texture in liquid crystal [J].Optical Engineering, 2012, 51(4): 040506.
[16] BUCHANAN J D, COWBURN R P, JAUSOVEC A V, et al.Fingerprinting’documents and packaging[J]. Nature, 2005, 436(7050): 475.
[17] NIKOLOPOULOS G M, DIAMANTI E. Continuous-variable quantum authentication of physical unclonable keys [J]. Scientific Reports, 2017,7: 1-13.