{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:15:44Z","timestamp":1743002144951,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030129415"},{"type":"electronic","value":"9783030129422"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12942-2_24","type":"book-chapter","created":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T08:26:50Z","timestamp":1549355210000},"page":"314-330","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Development of the Unified Security Requirements of PUFs During the Standardization Process"],"prefix":"10.1007","author":[{"given":"Nicolas","family":"Bruneau","sequence":"first","affiliation":[]},{"given":"Jean-Luc","family":"Danger","sequence":"additional","affiliation":[]},{"given":"Adrien","family":"Facon","sequence":"additional","affiliation":[]},{"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[]},{"given":"Soshi","family":"Hamaguchi","sequence":"additional","affiliation":[]},{"given":"Yohei","family":"Hori","sequence":"additional","affiliation":[]},{"given":"Yousung","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Schaub","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,6]]},"reference":[{"key":"24_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76804-5","volume-title":"Physically Unclonable Functions\u2014From Basic Design Principles to Advanced Hardware Security Applications","author":"B Halak","year":"2018","unstructured":"Halak, B.: Physically Unclonable Functions\u2014From Basic Design Principles to Advanced Hardware Security Applications. Springer, Cham (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-319-76804-5"},{"key":"24_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5040-5","volume-title":"Physical Unclonable Functions in Theory and Practice","author":"C B\u00f6hm","year":"2012","unstructured":"B\u00f6hm, C., Hofer, M.: Physical Unclonable Functions in Theory and Practice. Springer, New York (2012). \n                    https:\/\/doi.org\/10.1007\/978-1-4614-5040-5"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Cai, Y., Ghose, S., Luo, Y., Mai, K., Mutlu, O., Haratsch, E.F.: Vulnerabilities in MLC NAND flash memory programming: experimental analysis, exploits, and mitigation techniques. In: 2017 IEEE International Symposium on High Performance Computer Architecture, HPCA 2017, Austin, TX, USA, 4\u20138 February 2017, pp. 49\u201360. IEEE Computer Society (2017)","DOI":"10.1109\/HPCA.2017.61"},{"key":"24_CR4","unstructured":"Cherif, Z., Danger, J.-L., Guilley, S., Bossuet, L.: An easy-to-design PUF based on a single oscillator: the loop PUF. In: DSD,\u00c7e\u015fme, Izmir, Turkey, 5\u20138 September 2012 (2012). (\n                    Online PDF\n                    \n                  )"},{"key":"24_CR5","unstructured":"Altera Corporation: White paper: FPGA architecture, July 2006. ver. 1.0. \n                    https:\/\/www.altera.com\/content\/dam\/altera-www\/global\/en_US\/pdfs\/literature\/wp\/wp-01003.pdf\n                    \n                  . Accessed 19 Apr 2018"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Silicon physical random functions. In: Atluri, V. (ed.) Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, 18\u201322 November 2002, pp. 148\u2013160. ACM (2002)","DOI":"10.1145\/586110.586132"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Guilley, S., El Housni, Y.: Random numbers generation: tests and attacks. In: 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2018, Amsterdam, Netherlands, 13 September 2018. IEEE Computer Society (2018)","DOI":"10.1109\/FDTC.2018.00016"},{"issue":"1","key":"24_CR8","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11265-010-0560-z","volume":"67","author":"T G\u00fcneysu","year":"2012","unstructured":"G\u00fcneysu, T.: Using data contention in dual-ported memories for security applications. Signal Process. Syst. 67(1), 15\u201329 (2012)","journal-title":"Signal Process. Syst."},{"issue":"9","key":"24_CR9","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1109\/TC.2008.212","volume":"58","author":"DE Holcomb","year":"2009","unstructured":"Holcomb, D.E., Burleson, W.P., Fu, K.: Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 58(9), 1198\u20131210 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"24_CR10","unstructured":"ISO\/IEC JTC 1\/SC27\/WG2. ISO\/IEC 18031:2011 - Information technology - Security techniques - Random bit generation"},{"key":"24_CR11","unstructured":"ISO\/IEC JTC 1\/SC27\/WG3. ISO\/IEC DIS 20543 - Information technology - Security techniques - Test and analysis methods for random bit generators within ISO\/IEC 19790 and ISO\/IEC 15408"},{"key":"24_CR12","unstructured":"ISO\/IEC NP 20897. Information technology - Security techniques - Security requirements, test and evaluation methods for physically unclonable functions for generating nonstored security parameters. \n                    http:\/\/www.iso.org\/iso\/home\/store\/catalogue_tc\/catalogue_detail.htm?csnumber=69403"},{"key":"24_CR13","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29656-7","volume-title":"Fault Analysis in Cryptography","year":"2012","unstructured":"Joye, M., Tunstall, M. (eds.): Fault Analysis in Cryptography. Information Security and Cryptography. Springer, Heidelberg (2012). \n                    https:\/\/doi.org\/10.1007\/978-3-642-29656-7\n                    \n                  . ISBN 978-3-642-29655-0"},{"key":"24_CR14","unstructured":"Killmann, W., Schindler, W.: A proposal for: functionality classes for random number generators, September 2011. \n                    https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Zertifizierung\/Interpretationen\/AIS_31_Functionality_classes_for_random_number_generators_e.pdf?__blob=publicationFile"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Kim, Y., et al.: Flipping bits in memory without accessing them: an experimental study of DRAM disturbance errors. In: ACM\/IEEE 41st International Symposium on Computer Architecture, ISCA 2014, Minneapolis, MN, USA, 14\u201318 June 2014, pp. 361\u2013372. IEEE Computer Society (2014)","DOI":"10.1109\/ISCA.2014.6853210"},{"key":"24_CR16","unstructured":"Marsaglia, G.: The Marsaglia random number CDROM including the diehard battery of tests of randomness. Web site at the Department of Statistics, Florida State University, Tallahassee, FL, USA (1995)"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Mutlu, O.: The RowHammer problem and other issues we may face as memory becomes denser. In: Atienza, D., Di Natale, G. (eds.) Design, Automation and Test in Europe Conference and Exhibition, DATE 2017, Lausanne, Switzerland, 27\u201331 March 2017, pp. 1116\u20131121. IEEE (2017)","DOI":"10.23919\/DATE.2017.7927156"},{"key":"24_CR18","unstructured":"NIST. Recommendation for the entropy sources used for random bit generation (2012). \n                    http:\/\/csrc.nist.gov\/publications\/drafts\/800-90\/draft-sp800-90b.pdf"},{"issue":"5589","key":"24_CR19","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026\u20132030 (2002). \n                    https:\/\/doi.org\/10.1126\/science.1074376","journal-title":"Science"},{"key":"24_CR20","unstructured":"Pappu, R.S.: Physical one-way functions. Ph.D. thesis, Massachusetts Institute of Technology, March 2001"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, 4\u20138 October 2010, pp. 237\u2013249. ACM (2010)","DOI":"10.1145\/1866307.1866335"},{"key":"24_CR22","unstructured":"Rukhin, A., et al.: A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications, April 2010. \n                    https:\/\/nvlpubs.nist.gov\/nistpubs\/legacy\/sp\/nistspecialpublication800-22r1a.pdf"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Schaub, A., Danger, J.-L., Guilley, S., Rioul, O.: An improved analysis of reliability and entropy for delay PUFs. In: Novotn\u00fd, M., Konofaos, N., Skavhaug, A. (eds.) 21st Euromicro Conference on Digital System Design, DSD 2018, Prague, Czech Republic, 29\u201331 August 2018, pp. 553\u2013560. IEEE Computer Society (2018)","DOI":"10.1109\/DSD.2018.00096"},{"key":"24_CR24","unstructured":"Schaub, A., Rioul, O., Boutros, J.J., Danger, J.-L., Guilley, S.: Challenge codes for physically unclonable functions with Gaussian delays: a maximum entropy problem. In: Latin American Week on Coding and Information, UNICAMP - Campinas, Brazil, 22\u201327 July 2018 (2018). \n                    LAWCI"},{"key":"24_CR25","unstructured":"NIST FIPS (Federal Information Processing Standards). Security Requirements for Cryptographic Modules publication 140-2, 25 May 2001. \n                    http:\/\/csrc.nist.gov\/publications\/fips\/fips140-2\/fips1402.pdf"},{"issue":"1","key":"24_CR26","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/JSSC.2007.910961","volume":"43","author":"Y Su","year":"2008","unstructured":"Su, Y., Holleman, J., Otis, B.P.: A digital 1.6 pJ\/bit chip identification circuit using process variations. IEEE J. Solid-State Circuits 43(1), 69\u201377 (2008)","journal-title":"IEEE J. Solid-State Circuits"},{"key":"24_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/978-3-642-15031-9_25","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"D Suzuki","year":"2010","unstructured":"Suzuki, D., Shimizu, K.: The glitch PUF: a new delay-PUF architecture exploiting glitch shapes. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 366\u2013382. Springer, Heidelberg (2010). \n                    https:\/\/doi.org\/10.1007\/978-3-642-15031-9_25"},{"key":"24_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-984-2","volume-title":"Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting","author":"P Tuyls","year":"2007","unstructured":"Tuyls, P., \u0160koric, B., Kevenaar, T.: Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting, 1st edn. Springer, New York (2007). \n                    https:\/\/doi.org\/10.1007\/978-1-84628-984-2\n                    \n                  . ISBN 978-1-84628-983-5","edition":"1"},{"key":"24_CR29","doi-asserted-by":"crossref","unstructured":"Wu, M.-Y., et al.: A PUF scheme using competing oxide rupture with bit error rate approaching zero. In: 2018 IEEE International Solid-State Circuits Conference, ISSCC 2018, San Francisco, CA, USA, 11\u201315 February 2018, pp. 130\u2013132. IEEE (2018)","DOI":"10.1109\/ISSCC.2018.8310218"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12942-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:39:38Z","timestamp":1558478378000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12942-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030129415","9783030129422"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12942-2_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SECITC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security for Information Technology and Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bucharest","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Romania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.secitc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"5.0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Three papers of invited keynote speakers are included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}