[1]裴瞳.从安全存储器到安全处理器Maxim提供全面的安全性支持[J].电子技术应用,2009,35(1):6.
[2]杨洪亮.单片机应用系统加密策略探究[J].微计算机信息,2008,24(5):85-87.
[3]Maxim Conpration.1-Wire communication through software[EB/OL].(2002-05-30)[2009-11-23]http://pdfserv.max-im-ic.com/en/an/AN126.pdf.
[4]Maxim Conpration.1-Wire communication with a microchip
PICmicro Microcontroller[EB/OL].(2003-09-16)[2011-12-30]http://pdfserv.maxim-ic.com/en/an/AN2420.pdf.
[5]刘和平.PIC18Fxxx单片机程序设计及应用[M].北京:北京航空航天大学出版社,2005.
[6]Maxim Conpration.保护您的研发成果——双向认证及软件功能保护[EB/OL].(2006-06-23)[2011-08-13]http://china.m-axim-ic.com/app-notes/index.mvp/id/3675.
[7]Maxim Conpration.Challenge and Response with 1-Wire SHADevices[EB/OL].(2002-03-12)[2009-08-11]http://pdfserv.maxim-ic.com/en/an/AN190.pdf.
[8]Maxim Conpration.DS28E01-100 data sheets[EB/OL].(2010-07-05)[2012-09-15]http://datasheets.maxim-ic.com/cn/ds/DS28E01-100_cn.pdf.
[9]刘建东,余有明,江慧娜.单向Hash函数SHA-1的统计分析与算法改进[J].计算机科学,2009,36(10):141-145. |