{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:48:13Z","timestamp":1725544093225},"publisher-location":"Boston, MA","reference-count":19,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387718279"},{"type":"electronic","value":"9780387718293"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-0-387-71829-3_7","type":"book-chapter","created":{"date-parts":[[2010,2,2]],"date-time":"2010-02-02T18:19:26Z","timestamp":1265134766000},"page":"125-141","source":"Crossref","is-referenced-by-count":1,"title":["Process Variations for Security: PUFs"],"prefix":"10.1007","author":[{"given":"Roel","family":"Maes","sequence":"first","affiliation":[]},{"given":"Pim","family":"Tuyls","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,9]]},"reference":[{"key":"7_CR1","first-page":"125","volume-title":"Low cost attacks on tamper resistant devices. In","author":"R. J. Anderson","year":"1998","unstructured":"R. J. Anderson and M. G. Kuhn. Low cost attacks on tamper resistant devices. In Proceedings of the 5th International Workshop on Security Protocols, pages 125\u2013136, London, UK, 1998. Springer-Verlag."},{"key":"7_CR2","first-page":"513","volume-title":"Differential fault analysis of secret key cryptosystems. In","author":"E. Biham","year":"1997","unstructured":"E. Biham and A. Shamir. Differential fault analysis of secret key cryptosystems. In CRYPTO \u201997: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, pages 513\u2013525, London, UK, 1997. Springer-Verlag."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe. PRESENT: An ultra-lightweight block cipher. In CHES, pages 450\u2013466, 2007.","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"7_CR4","unstructured":"D.S. Boning and S.R. Nassif. Models of process variations in device and interconnect. In A. Chandrakasan and B. Bowhill, editors, Design of High Performance Microprocessor Circuit. IEEE Press, 2000."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"C. D. Canniere. Trivium: A stream cipher construction inspired by block cipher design principles. In ISC, pages 171\u2013186, 2006.","DOI":"10.1007\/11836810_13"},{"key":"7_CR6","unstructured":"C. D. Canniere and B. Preneel. Trivium specifications."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Y. Dodis, L. Reyzin, and A. Smith. Fuzzy Extractors: How to generate strong keys from biometrics and other noisy data. In EUROCRYPT, pages 523\u2013540, 2004.","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"B. Gassend, D. E. Clarke, M. van Dijk, and S. Devadas. Silicon physical unknown functions. In V. Atluri, editor, ACM Conference on Computer and Communications Security \u2014 CCS 2002, pages 148\u2013160. ACM, November 2002.","DOI":"10.1145\/586110.586132"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"J. Guajardo, S. S. Kumar, G. J. Schrijen, and P. Tuyls. FPGA intrinsic PUFs and their use for IP protection. In CHES, pages 63\u201380, September 2007.","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"7_CR10","unstructured":"D. M. Hopkins, L. T. Kontnik, and M. T. Turnage. Counterfeiting Exposed: Protecting your Brand and Customers. Business Strategy. Wiley, 2003."},{"key":"7_CR11","first-page":"142","volume-title":"Secure configuration of field programmable gate arrays. In","author":"T. Kean","year":"2001","unstructured":"T. Kean. Secure configuration of field programmable gate arrays. In FPL \u201901: Proceedings of the 11th International Conference on Field-Programmable Logic and Applications, pages 142\u2013151, Springer-Verlag, London, UK, 2001."},{"key":"7_CR12","first-page":"388","volume-title":"Differential power analysis. In","author":"P. C. Kocher","year":"1999","unstructured":"P. C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In CRYPTO \u201999: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, pages 388\u2013397, Springer-Verlag, London, UK, 1999."},{"issue":"10","key":"7_CR13","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D. Lim","year":"2005","unstructured":"D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas. Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 13(10):1200\u20131205, October 2005.","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"7_CR14","unstructured":"R. Maes, P. Tuyls and I. Verbauwhede. Statistical Analysis of Silicon PUF responses for Device Identification. Workshop on Secure Component and System Identification \u2013 SECSI 2008."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"V. Shoup. A Computational Introduction to Number Theory and Algebra. Cambridge University Press, June 2005.","DOI":"10.1017\/CBO9781139165464"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"E. Simpson and P. Schaumont. Offline hardware\/software authentication for reconfigurable platforms. In L. Goubin and M. Matsui, editors, Cryptographic Hardware and Embedded Systems \u2014 CHES 2006, LNCS 4249, pages 311\u2013323. Springer, October 10-13, 2006.","DOI":"10.1007\/11894063_25"},{"key":"7_CR17","volume-title":"Topics in Cryptology - CT-RSA 2006","author":"P. Tuyls","year":"2006","unstructured":"P. Tuyls and L. Batina. RFID-tags for Anti-Counterfeiting. In D. Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, LNCS, Springer-Verlag, San Jose, USA, February 13-17 2006."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"P. Tuyls and J. Goseling. Capacity and examples of template-protecting biometric authentication systems, 2004.","DOI":"10.1007\/978-3-540-25976-3_15"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"P. Tuyls, G.-J. Schrijen, B. Skoric, J. van Geloven, N. Verhaegh, and R. Wolters. Read-proof hardware from protective coatings. In Cryptographic Hardware and Embedded Systems \u2014 CHES 2006, LNCS 4249, pages 369\u2013383, Springer, October 10-13, 2006.","DOI":"10.1007\/11894063_29"}],"container-title":["Integrated Circuits and Systems","Secure Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-71829-3_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T22:12:50Z","timestamp":1605651170000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-71829-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,9]]},"ISBN":["9780387718279","9780387718293"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-71829-3_7","relation":{},"ISSN":["1558-9412"],"issn-type":[{"type":"print","value":"1558-9412"}],"subject":[],"published":{"date-parts":[[2009,12,9]]}}}