{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:30:55Z","timestamp":1742970655362,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":72,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461479147"},{"type":"electronic","value":"9781461479154"}],"license":[{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-7915-4_19","type":"book-chapter","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T08:10:18Z","timestamp":1378973418000},"page":"429-449","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Physical Security Primitives"],"prefix":"10.1007","author":[{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Steffen","family":"Schulz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christian","family":"Wachsmann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,9,13]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Maes, R., Sadeghi, A.R., Standaert, F.X., Wachsmann, C.: A formal foundation for the security features of physical functions. In: IEEE Symposium on Security and Privacy (SSP), pp. 397\u2013412. IEEE Computer Society (2011)","DOI":"10.1109\/SP.2011.10"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Maes, R., Sadeghi, A.R., Sunar, B., Tuyls, P.: Memory leakage-resilient encryption based on physically unclonable functions. In: M. Matsui (ed.) Advances in Cryptology (ASIACRYPT), Lecture Notes in Computer Science (LNCS), vol. 5912, pp. 685\u2013702. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2009)","DOI":"10.1007\/978-3-642-10366-7_40"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Beckmann, N., Potkonjak, M.: Hardware-based public-key cryptography with public physically unclonable functions. In: S. Katzenbeisser, A.R. Sadeghi (eds.) Information Hiding (IH), Lecture Notes in Computer Science (LNCS), vol. 5806, pp. 206\u2013220. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2009)","DOI":"10.1007\/978-3-642-04431-1_15"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Bolotnyy, L., Robins, G.: Physically unclonable function-based security and privacy in RFID systems. In: Conference on Pervasive Computing and Communications (PerCom), pp. 211\u2013220. IEEE (2007)","DOI":"10.1109\/PERCOM.2007.26"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Boyen, X.: Reusable cryptographic fuzzy extractors. In: ACM Conference on Computer and Communications Security (ACM CCS), pp. 82\u201391. ACM, New York, NY, USA (2004)","DOI":"10.1145\/1030083.1030096"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Improved privacy of the tree-based hash protocols using physically unclonable functions. In: R. Ostrovsky, R. De Prisco, I. Visconti (eds.) Security and Cryptography for Networks (SCN), Lecture Notes in Computer Science (LNCS), vol. 5229, pp. 77\u201391. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2008)","DOI":"10.1007\/978-3-540-85855-3_6"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Icart, T.: On physical obfuscation of cryptographic algorithms. In: B. Roy, N. Sendrier (eds.) International Conference on Cryptology in India (INDOCRYPT), Lecture Notes in Computer Science (LNCS), vol. 5922, pp. 88\u2013103. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2009)","DOI":"10.1007\/978-3-642-10628-6_6"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Brzuska, C., Fischlin, M., Schr\u00f6der, H., Katzenbeisser, S.: Physically uncloneable functions in the universal composition framework. In: P. Rogaway (ed.) Advances in Cryptology (CRYPTO), Lecture Notes in Computer Science (LNCS), vol. 6841, pp. 51\u201370. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2011)","DOI":"10.1007\/978-3-642-22792-9_4"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., Khandelwal, V.: Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications. RFID, 2008 IEEE International Conference on pp. 58\u201364 (2008)","DOI":"10.1109\/RFID.2008.4519377"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. In: C. Dwork (ed.) Advances in Cryptology (CRYPTO), Lecture Notes in Computer Science (LNCS), vol. 4117, pp. 232\u2013250. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2006)","DOI":"10.1007\/11818175_14"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: C. Cachin, J. Camenisch (eds.) Advances in Cryptology (EUROCRYPT), Lecture Notes in Computer Science (LNCS), vol. 3027, pp. 523\u2013540. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Eichhorn, I., Koeberl, P., van der Leest, V.: Logically reconfigurable PUFs: Memory-based secure key storage. In: ACM Workshop on Scalable Trusted Computing (ACM STC), pp. 59\u201364. ACM, New York, NY, USA (2011)","DOI":"10.1145\/2046582.2046594"},{"key":"19_CR13","unstructured":"Gassend, B.: Physical random functions. Master\u2019s thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (MIT), The Stata Center, 32 Vassar Street, Cambridge, Massachusetts 02139 (2003)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled physical random functions. In: Annual Computer Security Applications Conference (ACSAC), pp. 149\u2013160. IEEE (2002)","DOI":"10.1145\/586110.586132"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security (ACM CCS), pp. 148\u2013160. ACM, New York, NY, USA (2002)","DOI":"10.1145\/586110.586132"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: P. Paillier, I. Verbauwhede (eds.) Cryptographic Hardware and Embedded Systems (CHES), Lecture Notes in Computer Science (LNCS), vol. 4727, pp. 63\u201380. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2007)","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: Physical unclonable functions and public-key crypto for FPGA IP protection. In: Field Programmable Logic and Applications (FPL), pp. 189\u2013195. IEEE (2007)","DOI":"10.1109\/FPL.2007.4380646"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: Brand and IP protection with physical unclonable functions. In: IEEE International Symposium on Circuits and Systems (ISCAS), pp. 3186\u20133189. IEEE (2008)","DOI":"10.1109\/ISCAS.2008.4542135"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Hammouri, G., Dana, A., Sunar, B.: CDs have fingerprints too. In: C. Clavier, K. Gaj (eds.) Cryptographic Hardware and Embedded Systems (CHES), Lecture Notes in Computer Science (LNCS), vol. 5747, pp. 348\u2013362. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2009)","DOI":"10.1007\/978-3-642-04138-9_25"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Hammouri, G., \u00d6zt\u00fcrk, E., Birand, B., Sunar, B.: Unclonable lightweight authentication scheme. In: L. Chen, M.D. Ryan, G. Wang (eds.) International Conference on Information and Communications Security (ICICS), Lecture Notes in Computer Science (LNCS), vol. 5308, pp. 33\u201348. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2008)","DOI":"10.1007\/978-3-540-88625-9_3"},{"key":"19_CR21","unstructured":"Holcomb, D., Burleson, W., Fu, K.: Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Workshop on RFID Security (RFIDSec) (2007)"},{"issue":"9","key":"19_CR22","doi-asserted-by":"crossref","first-page":"1198","DOI":"10.1109\/TC.2008.212","volume":"58","author":"D. Holcomb","year":"2009","unstructured":"Holcomb, D., Burleson, W.P., Fu, K.: Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Transactions on Computers 58(9), 1198\u20131210 (2009)","journal-title":"IEEE Transactions on Computers"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Ignatenko, T., Schrijen, G.J., \u0160kori\u0107, B., Tuyls, P., Willems, F.: Estimating the secrecy-rate of physical unclonable functions with the context-tree weighting method. In: IEEE International Symposium on Information Theory (ISIT), pp. 499\u2013503. IEEE (2006)","DOI":"10.1109\/ISIT.2006.261765"},{"key":"19_CR24","unstructured":"Intrinsic ID: Website. http:\/\/www.intrinsic-id.com\/products.htm (2012)"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Karakoyunlu, D., Sunar, B.: Differential template attacks on PUF enabled cryptographic devices. In: Workshop on Information Forensics and Security (WIFS), pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/WIFS.2010.5711445"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Kardas, S., Kiraz, M.S., Bingol, M.A., Demirci, H.: A novel RFID distance bounding protocol based on physically unclonable functions. In: Radio Frequency Identification: Security and Privacy Issues (RFIDSec), Lecture Notes in Computer Science (LNCS). Springer Berlin\/Heidelberg, Berlin, Heidelberg (2011)","DOI":"10.1007\/978-3-642-25286-0_6"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Kocaba\u015f, U., van der Leest, V., Sadeghi, A.R., Schrijen, G.J., Schr\u00f6der, H., Wachsmann, C.: Recyclable PUFs: Logically reconfigurable PUFs. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), vol. 6917, pp. 374\u2013389. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2011)","DOI":"10.1007\/978-3-642-23951-9_25"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Kocabas, \u00dc., Sadeghi, A.R., Schulz, S., Wachsmann, C.: Poster: Practical embedded remote attestation using physically unclonable functions (2011)","DOI":"10.1145\/2046707.2093496"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.J., Tuyls, P.: Extended abstract: The butterfly PUF protecting IP on every FPGA. In: Workshop on Hardware-Oriented Security (HOST), pp. 67\u201370. IEEE (2008)","DOI":"10.1109\/HST.2008.4559053"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Kursawe, K., Sadeghi, A.R., Schellekens, D., Skoric, B., Tuyls, P.: Reconfigurable physical unclonable functions \u2013 Enabling technology for tamper-resistant storage. In: Workshop on Hardware-Oriented Security and Trust (HOST), pp. 22\u201329. IEEE (2009)","DOI":"10.1109\/HST.2009.5225058"},{"key":"19_CR31","unstructured":"Lee, J.W., Lim, D., Gassend, B., Suh, E.G., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium on VLSI Circuits, pp. 176\u2013179. IEEE (2004)"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"van der Leest, V., Schrijen, G.J., Handschuh, H., Tuyls, P.: Hardware intrinsic security from D flip-flops. In: ACM Workshop on Scalable Trusted Computing (ACM STC), pp. 53\u201362. ACM, New York, NY, USA (2010)","DOI":"10.1145\/1867635.1867644"},{"key":"19_CR33","unstructured":"Lim, D.: Extracting secret keys from integrated circuits. Master\u2019s thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (MIT), The Stata Center, 32 Vassar Street, Cambridge, Massachusetts 02139 (2004)"},{"issue":"10","key":"19_CR34","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D. Lim","year":"2005","unstructured":"Lim, D., Lee, J.W., Gassend, B., Suh, E.G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 13(10), 1200\u20131205 (2005)","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Lin, L., Holcomb, D., Krishnappa, D.K., Shabadi, P., Burleson, W.: Low-power sub-threshold design of secure physical unclonable functions. In: International Symposium on Low-Power Electronics and Design (ISLPED), pp. 43\u201348. IEEE (2010)","DOI":"10.1145\/1840845.1840855"},{"key":"19_CR36","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic PUFs from flip-flops on reconfigurable devices. In: Benelux Workshop on Information and System Security (2008)"},{"key":"19_CR37","doi-asserted-by":"crossref","unstructured":"Maes, R., Verbauwhede, I.: Physically unclonable functions: A study on the state of the art and future research directions. In: A.R. Sadeghi, D. Naccache (eds.) Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp. 3\u201337. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2010)","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"19_CR38","doi-asserted-by":"crossref","unstructured":"Maiti, A., Casarona, J., McHale, L., Schaumont, P.: A large scale characterization of RO-PUF. In: Symposium on Hardware-Oriented Security and Trust (HOST), pp. 94\u201399. IEEE (2010)","DOI":"10.1109\/HST.2010.5513108"},{"key":"19_CR39","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Lightweight secure PUFs. In: International Conference on Computer-Aided Design (ICCAD), pp. 670\u2013673. IEEE (2008)","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"19_CR40","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Testing techniques for hardware security. In: International Test Conference (ITC), pp. 1\u201310. IEEE (2008)","DOI":"10.1109\/TEST.2008.4700636"},{"issue":"1","key":"19_CR41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1502781.1502786","volume":"2","author":"M. Majzoobi","year":"2009","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Techniques for design and implementation of secure reconfigurable PUFs. ACM Transactions on Reconfigurable Technology and Systems (TRETS) 2(1), 1\u201333 (2009)","journal-title":"ACM Transactions on Reconfigurable Technology and Systems (TRETS)"},{"key":"19_CR42","unstructured":"Marsaglia, G.: The marsaglia random number CDROM including the Diehard battery of tests of randomness. http:\/\/www.stat.fsu.edu\/pub\/diehard\/"},{"key":"19_CR43","doi-asserted-by":"crossref","unstructured":"Merli, D., Schuster, D., Stumpf, F., Sigl, G.: Side-channel analysis of PUFs and fuzzy extractors. In: J.M. McCune, B. Balacheff, A. Perrig, A.R. Sadeghi, A. Sasse, Y. Beres (eds.) Trust and Trustworthy Computing (TRUST), Lecture Notes in Computer Science (LNCS), vol. 6740, pp. 33\u201347. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2011)","DOI":"10.1007\/978-3-642-21599-5_3"},{"key":"19_CR44","doi-asserted-by":"crossref","unstructured":"\u00d6zt\u00fcrk, E., Hammouri, G., Sunar, B.: Towards robust low cost authentication for pervasive devices. In: Conference on Pervasive Computing and Communications (PerCom), pp. 170\u2013178. IEEE, Washington, DC, USA (2008)","DOI":"10.1109\/PERCOM.2008.54"},{"issue":"5589","key":"19_CR45","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R. Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026\u20132030 (2002)","journal-title":"Science"},{"issue":"7","key":"19_CR46","first-page":"652","volume":"4","author":"R. Posch","year":"1998","unstructured":"Posch, R.: Protecting devices by active coating. Journal of Universal Computer Science 4(7), 652\u2013668 (1998)","journal-title":"Journal of Universal Computer Science"},{"key":"19_CR47","unstructured":"Ranasinghe, D.C., Engels, D.W., Cole, P.H.: Security and privacy: Modest proposals for low-cost RFID systems. In: Auto-ID Labs Research Workshop (2004)"},{"key":"19_CR48","unstructured":"R\u00fchrmair, U.: SIMPL systems: On a public key variant of physical unclonable functions. Cryptology ePrint Archive, Report 2009\/255 (2009)"},{"key":"19_CR49","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U.: SIMPL systems, or: Can we design cryptographic hardware without secret key information? In: I. \u010cern\u00e1, T. Gyim\u00f3thy, J. Hromkovi\u010d, K. Jefferey, R. Kr\u00e1lovi\u0107, M. Vukoli\u0107, S. Wolf (eds.) Current Trends in Theory and Practice of Computer Science (SOFSEM), Lecture Notes in Computer Science (LNCS), vol. 6543, pp. 26\u201345. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2011)","DOI":"10.1007\/978-3-642-18381-2_3"},{"key":"19_CR50","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Chen, Q., Stutzmann, M., Lugli, P., Schlichtmann, U., Csaba, G.: Towards electrical, integrated implementations of SIMPL systems. In: P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, D. Sauveron (eds.) Workshop on Information Security Theory and Practices (WISTP), Lecture Notes in Computer Science (LNCS), vol. 6033, pp. 277\u2013292. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2010)","DOI":"10.1007\/978-3-642-12368-9_22"},{"key":"19_CR51","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: ACM Conference on Computer and Communications Security (ACM CCS), pp. 237\u2013249. ACM, New York, NY, USA (2010)","DOI":"10.1145\/1866307.1866335"},{"key":"19_CR52","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., S\u00f6lter, J., Sehnke, F.: On the foundations of physical unclonable functions. Cryptology ePrint Archive, Report 2009\/277 (2009)","DOI":"10.1145\/1866307.1866335"},{"key":"19_CR53","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. Special Publication 800\u201322 Revision 1a, NIST (2010)"},{"key":"19_CR54","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: Enhancing RFID security and privacy by physically unclonable functions. In: A.R. Sadeghi, D. Naccache (eds.) Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp. 281\u2013305. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2010)","DOI":"10.1007\/978-3-642-14452-3_13"},{"key":"19_CR55","doi-asserted-by":"crossref","unstructured":"Schulz, S., Sadeghi, A.R., Wachsmann, C.: Short paper: Lightweight remote attestation using physical functions. In: ACM Conference on Wireless Network Security (WiSec), pp. 109\u2013114. ACM, New York, NY, USA (2011)","DOI":"10.1145\/1998412.1998432"},{"key":"19_CR56","unstructured":"Schulz, S., Wachsmann, C., Sadeghi, A.R.: Lightweight remote attestation using physical functions. Tech. rep., Center for Advanced Security Research Darmstadt (CASED), Germany, Mornewegstra\u00dfe 32, 64293 Darmstadt, Germany (2011)"},{"key":"19_CR57","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.: Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. In: ACM Symposium on Operating Systems Principles (SOSP), vol. 39, pp. 1\u201316. ACM, New York, NY, USA (2005)","DOI":"10.1145\/1095809.1095812"},{"key":"19_CR58","unstructured":"Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: SWATT: SoftWare-based ATTestation for embedded devices. In: IEEE Symposium on Security and Privacy (SSP), pp. 272\u2013282. IEEE, Los Alamitos, CA, USA (2004)"},{"key":"19_CR59","doi-asserted-by":"crossref","unstructured":"Su, Y., Holleman, J., Otis, B.P.: A 1.6pJ\/bit 96% stable chip-ID generating circuit using process variations. In: International Solid-State Circuits Conference (ISSCC), pp. 406\u2013611. IEEE (2007)","DOI":"10.1109\/ISSCC.2007.373466"},{"issue":"1","key":"19_CR60","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/JSSC.2007.910961","volume":"43","author":"Y. Su","year":"2008","unstructured":"Su, Y., Holleman, J., Otis, B.P.: A digital 1.6 pJ\/bit chip identification circuit using process variations. IEEE Journal of Solid-State Circuits 43(1), 69\u201377 (2008)","journal-title":"IEEE Journal of Solid-State Circuits"},{"key":"19_CR61","doi-asserted-by":"crossref","unstructured":"Suh, E.G., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: ACM\/IEEE Design Automation Conference (DAC), pp. 9\u201314. IEEE (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"19_CR62","doi-asserted-by":"crossref","unstructured":"Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: D. Pointcheval (ed.) Topics in Cryptology (CT-RSA), Lecture Notes in Computer Science (LNCS), vol. 3860, pp. 115\u2013131. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2006)","DOI":"10.1007\/11605805_8"},{"key":"19_CR63","doi-asserted-by":"crossref","unstructured":"Tuyls, P., Schrijen, G.J., \u0160kori\u0107, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-proof hardware from protective coatings. In: L. Goubin, M. Matsui (eds.) Cryptographic Hardware and Embedded Systems (CHES), Lecture Notes in Computer Science (LNCS), vol. 4249, pp. 369\u2013383. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2006)","DOI":"10.1007\/11894063_29"},{"key":"19_CR64","doi-asserted-by":"crossref","unstructured":"Tuyls, P., \u0160kori\u0107, B.: Secret key generation from classical physics: Physical uncloneable functions. In: S. Mukherjee, R.M. Aarts, R. Roovers, F. Widdershoven, M. Ouwerkerk (eds.) Am Iware Hardware Technology Drivers of Ambient Intelligence, Philips Research Book Series, vol. 5, pp. 421\u2013447. Springer Netherlands, Dordrecht (2006)","DOI":"10.1007\/1-4020-4198-5_20"},{"key":"19_CR65","doi-asserted-by":"crossref","unstructured":"Tuyls, P., \u0160kori\u0107, B., Ignatenko, T., Willems, F., Schrijen, G.J.: Entropy estimation for optical PUFs based on context-tree weighting methods. In: P. Tuyls, B. \u0160kori\u0107, T. Kevenaar (eds.) Security with Noisy Data, pp. 217\u2013233. Springer London, London (2007)","DOI":"10.1007\/978-1-84628-984-2_13"},{"key":"19_CR66","doi-asserted-by":"crossref","unstructured":"Tuyls, P., \u0160kori\u0107, B., Stallinga, S., Akkermans, A.H.M., Ophey, W.: Information-theoretic security analysis of physical uncloneable functions. In: A. Patrick, M. Yung (eds.) Financial Cryptography and Data Security (FC), Lecture Notes in Computer Science (LNCS), vol. 3570, p. 578. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2005)","DOI":"10.1007\/11507840_15"},{"key":"19_CR67","unstructured":"Verayo, Inc.: Website. http:\/\/www.verayo.com\/product\/products.html (2012)"},{"issue":"2","key":"19_CR68","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1063\/1.2209532","volume":"100","author":"B. \u0160kori\u0107","year":"2006","unstructured":"\u0160kori\u0107, B., Maubach, S., Kevenaar, T., Tuyls, P.: Information-theoretic analysis of capacitive physical unclonable functions. Journal of Applied Physics 100(2), 024,902\u2013024,902\u201311 (2006)","journal-title":"Journal of Applied Physics"},{"key":"19_CR69","unstructured":"\u0160kori\u0107, B., Maubach, S., Kevenaar, T., Tuyls, P.: Information-theoretic analysis of coating PUFs. Cryptology ePrint Archive, Report 2006\/101 (2006)"},{"key":"19_CR70","doi-asserted-by":"crossref","unstructured":"\u0160kori\u0107, B., Tuyls, P., Ophey, W.: Robust key extraction from physical uncloneable functions. In: J. Ioannidis, A. Keromytis, M. Yung (eds.) Applied Cryptography and Network Security (ACNS), Lecture Notes in Computer Science (LNCS), vol. 3531, pp. 99\u2013135. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2005)","DOI":"10.1007\/11496137_28"},{"key":"19_CR71","unstructured":"Willems, F.M.J.: CTW website. http:\/\/www.ele.tue.nl\/ctw\/"},{"issue":"3","key":"19_CR72","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/18.382012","volume":"41","author":"F.M.J. Willems","year":"1995","unstructured":"Willems, F.M.J., Shtarkov, Y.M., Tjalkens, T.J.: The context-tree weighting method: Basic properties. IEEE Transactions on Information Theory 41(3), 653\u2013664 (1995)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Secure Smart Embedded Devices, Platforms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-7915-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T16:45:03Z","timestamp":1676825103000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-7915-4_19"}},"subtitle":["A Survey on Physically Unclonable Functions and PUF-Based Security Solutions"],"short-title":[],"issued":{"date-parts":[[2013,9,13]]},"ISBN":["9781461479147","9781461479154"],"references-count":72,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-7915-4_19","relation":{},"subject":[],"published":{"date-parts":[[2013,9,13]]},"assertion":[{"value":"13 September 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}