{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:40:54Z","timestamp":1775857254919,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540465591","type":"print"},{"value":"9783540465614","type":"electronic"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11894063_29","type":"book-chapter","created":{"date-parts":[[2006,10,16]],"date-time":"2006-10-16T21:49:01Z","timestamp":1161035341000},"page":"369-383","source":"Crossref","is-referenced-by-count":237,"title":["Read-Proof Hardware from Protective Coatings"],"prefix":"10.1007","author":[{"given":"Pim","family":"Tuyls","sequence":"first","affiliation":[]},{"given":"Geert-Jan","family":"Schrijen","sequence":"additional","affiliation":[]},{"given":"Boris","family":"\u0160kori\u0107","sequence":"additional","affiliation":[]},{"given":"Jan","family":"van Geloven","sequence":"additional","affiliation":[]},{"given":"Nynke","family":"Verhaegh","sequence":"additional","affiliation":[]},{"given":"Rob","family":"Wolters","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-24638-1_15","volume-title":"Theory of Cryptography","author":"R. Gennaro","year":"2004","unstructured":"Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic Tamper-Proof Security: Theoretical Foundations for Security against Hardware Tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol.\u00a02951, pp. 258\u2013277. Springer, Heidelberg (2004)"},{"key":"29_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R. Anderson","year":"1998","unstructured":"Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 125\u2013136. Springer, Heidelberg (1998)"},{"key":"29_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"29_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Crypto Systems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"29_CR5","unstructured":"\u0160kori\u0107, B., Maubach, S., Kevenaar, T., Tuyls, P.: Information-theoretic analysis of coating PUFs. Journal of Applied Physics(accepted for publication), \n                    \n                      http:\/\/eprint.iacr.org\/2006\/101"},{"issue":"6","key":"29_CR6","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"C.H. Bennett","year":"1995","unstructured":"Bennett, C.H., Brassard, G., Crepeau, C., Maurer, U.: Generalized Privacy Amplification. IEEE Transactions on Information Theory\u00a041(6), 1915\u20131923 (1995)","journal-title":"IEEE Transactions on Information Theory"},{"key":"29_CR7","unstructured":"Bar-El, H.: Known Attacks Against Smartcards, Discretix Technologies Ltd., \n                    \n                      http:\/\/www.infosecwriters.com\/text_resources\/pdf\/Known_Attacks_Against_Smartcards.pdf"},{"key":"29_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, M., Smith, A.: Fuzzy Extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: 6th ACM Conference on Computer and Communication Security, pp. 28\u201336 (1999)","DOI":"10.1145\/319709.319714"},{"key":"29_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/3-540-44887-X_47","volume-title":"Audio-and Video-Based Biometrie Person Authentication","author":"J.P. Linnartz","year":"2003","unstructured":"Linnartz, J.P., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol.\u00a02688, pp. 393\u2013402. Springer, Heidelberg (2003)"},{"key":"29_CR11","unstructured":"Pappu, R.: Physical One-way functions, Ph.D. thesis. MIT (2001)"},{"key":"29_CR12","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R. Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-way functions. Science\u00a0297, 2026\u20132030 (2002)","journal-title":"Science"},{"key":"29_CR13","unstructured":"Posch, R.: Protecting Devices by Active Coating. Journal of Universal Computer Science\u00a04(7) (1998)"},{"key":"29_CR14","unstructured":"Kamendje, G.A., Posch, R.: Intrusion aware CMOS Random Pattern Generator for Cryptographic Applications. In: Rossler, P., Dorderlein, A. (eds.) Proceedings of Austrochip 2001, Vienna, Austria (October 12, 2001) ISBN 3-9501517-0-2"},{"key":"29_CR15","unstructured":"Smartec, Universal Transducer Interface evaluation board, Specifications v3.0, \n                    \n                      http:\/\/www.smartec.nl\/pdf\/Dsuti.pdf"},{"key":"29_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11605805_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Batina, L.: RFID tags for Anti-Counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 115\u2013131. Springer, Heidelberg (2006)"},{"key":"29_CR17","series-title":"Philips Research Book Series","first-page":"421","volume-title":"AmIware, Hardware Technology Drivers of Ambient Intelligence","author":"P. Tuyls","year":"2005","unstructured":"Tuyls, P., \u0160kori\u0107, B.: Secret Key Generation from Classical Physics. In: Mukherjee, et al. (eds.) AmIware, Hardware Technology Drivers of Ambient Intelligence. Philips Research Book Series, pp. 421\u2013447. Kluwer, Dordrecht (2005)"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Ignatenko, T., Schrijen, G.J., \u0160kori\u0107, B., Tuyls, P., Willems, F.: Estimating the Secrecy-Rate of Physical Uncloneable Functions with the Context-Tree Weighting Method, accepted at ISIT 2006 (2006)","DOI":"10.1109\/ISIT.2006.261765"},{"key":"29_CR19","unstructured":"Witteman, M.: Smart card security analysis. In: IPA Spring Days on Security, Kapellerput, Heeze, April 18-20 (2001), \n                    \n                      http:\/\/www.win.tue.nl\/ipa\/archive\/springdays2001\/witteman.ppt"},{"key":"29_CR20","unstructured":"Witteman, M.: Advances in Smartcard Security. In: Information Security Bulletin, July 2002, pp.11\u201322 (2002), \n                    \n                      http:\/\/www.riscure.com\/articles\/ISB0707MW.pdf"},{"issue":"5","key":"29_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCOMM.2005.849846","volume":"53","author":"J. Yang","year":"2005","unstructured":"Yang, J., Gao, L., Zhang, Y.: Improving Memory Encryption Performance in Secure Processors. IEEE. Trans. Computers\u00a053(5), 1\u201311 (2005)","journal-title":"IEEE. Trans. Computers"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2006"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11894063_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T17:59:42Z","timestamp":1558288782000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11894063_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540465591","9783540465614"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11894063_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}