1. M. Bellare, A. Palacio, in GQ and Schnorr Identification Schemes: Proofs of Security Against Impersonation Under Active and Concurrent Attacks. Advances in Cryptology (CRYPTO 2002), Proceedings. Lecture Notes in Computer Science, vol. 2442 (Springer, London, 2002), pp. 162–177
2. Q. Chen, G. Csaba, X. Ju, S.B. Natarajan, P. Lugli, M. Stutzmann, U. Schlichtmann, U. Rührmair, Analog Circuits for Physical Cryptography. 12th International Symposium on Integrated Circuits (ISIC), Singapore, 14–16 Dec, 2009
3. G. Csaba, X. Ju, Z. Ma, Q. Chen, W. Porod, J. Schmidhuber, U. Schlichtmann, P. Lugli, U. Rührmair, in Application of Mismatched Cellular Nonlinear Networks for Physical Cryptography. 12th IEEE CNNA - International Workshop on Cellular Nanoscale Networks and their Applications, Berkeley, CA, USA, 3–5 Feb 2010
4. S. Devadas G.E. Suh, in Physical Unclonable Functions for Device Authentication and Secret Key Generation. Proceedings of the Design Automation Conference (DAC 2007), San Diego, CA, USA, 4–8 June 2007, pp. 9–14
5. B. Gassend, D. Lim, D. Clarke, M. van Dijk, S. Devadas, Identification and authentication of integrated circuits. Concurr. Comput. 16(11), 1077–1098 (2004)