{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:04:28Z","timestamp":1771661068788,"version":"3.50.1"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_60","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"904-922","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Response-Based Cryptography Engine in Distributed-Memory"],"prefix":"10.1007","author":[{"given":"Christopher","family":"Philabaum","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Coffey","sequence":"additional","affiliation":[]},{"given":"Bertrand","family":"Cambou","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Gowanlock","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","unstructured":"Anderson, S.E.: Bit Twiddling Hacks (2005)"},{"key":"60_CR2","unstructured":"Antoniadis, A., Sklavos, N., Kavun, E.B.: An efficient implementation of a delay-based PUF construction. In: Proceedings of Trustworthy Manufacturing and Utilization of Secure Devices Workshop, Design, Automation and Test in Europe Conference, DATE 2020, Paris, France (2020)"},{"key":"60_CR3","doi-asserted-by":"crossref","unstructured":"Assiri, S., Cambou, B., Booher, D.D., Ghanai Miandoab, D., Mohammadinodoushan, M.: Key exchange using ternary system to enhance security. In: IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0488\u20130492 (2019)","DOI":"10.1109\/CCWC.2019.8666511"},{"key":"60_CR4","doi-asserted-by":"crossref","unstructured":"Booher, D.D., Cambou, B., Carlson, A.H., Philabaum, C.: Dynamic key generation for polymorphic encryption. In: IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0482\u20130487 (2019)","DOI":"10.1109\/CCWC.2019.8666500"},{"key":"60_CR5","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-85053-3_12","volume-title":"Cryptographic Hardware and Embedded Systems","author":"C B\u00f6sch","year":"2008","unstructured":"B\u00f6sch, C., Guajardo, J., Sadeghi, A.-R., Shokrollahi, J., Tuyls, P.: Efficient helper data key extractor on FPGAs. In: Oswald, E., Rohatgi, P. (eds.) Cryptographic Hardware and Embedded Systems, pp. 181\u2013197. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_12"},{"key":"60_CR6","doi-asserted-by":"crossref","unstructured":"Boyen, X.: Reusable cryptographic fuzzy extractors. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 82\u201391. ACM, New York (2004)","DOI":"10.1145\/1030083.1030096"},{"key":"60_CR7","doi-asserted-by":"crossref","unstructured":"Cambou, B., Telesca, D.: Ternary computing to strengthen information assurance. Development of ternary state based public key exchange. In: SAI Computing Conference. IEEE (2018)","DOI":"10.1007\/978-3-030-01177-2_67"},{"key":"60_CR8","unstructured":"Cambou, B.: Physically unclonable function generating systems and related methods. US Patent 9,985,791, 29 May 2018"},{"key":"60_CR9","doi-asserted-by":"crossref","unstructured":"Cambou, B.: Unequally powered cryptography with physical unclonable functions for networks of internet of things terminals. In: Proceedings of the Communications & Networking Symposium, CNS 2019, San Diego, CA, USA, pp. 4:1\u20134:13. Society for Computer Simulation International (2019)","DOI":"10.23919\/SpringSim.2019.8732853"},{"issue":"1","key":"60_CR10","doi-asserted-by":"publisher","first-page":"6","DOI":"10.3390\/cryptography2010006","volume":"2","author":"B Cambou","year":"2018","unstructured":"Cambou, B., Flikkema, P.G., Palmer, J., Telesca, D., Philabaum, C.: Can ternary computing improve information assurance? Cryptography 2(1), 6 (2018)","journal-title":"Cryptography"},{"key":"60_CR11","doi-asserted-by":"crossref","unstructured":"Cambou, B., Orlowski, M.: PUF designed with resistive ram and ternary states. In: Proceedings of the 11th Annual Cyber and Information Security Research Conference, pp. 1\u20138 (2016)","DOI":"10.1145\/2897795.2897808"},{"key":"60_CR12","unstructured":"Cambou, B., Philabaum, C., Booher, D.: Response-based cryptography with PUFs. NAU Case D2018-049"},{"key":"60_CR13","unstructured":"Cambou, B., Philabaum, C., Booher, D.: Replacing error correction by key fragmentation and search engines to generate error-free cryptographic keys from PUFs. In: CryptArchi (2019)"},{"key":"60_CR14","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1007\/978-3-030-12385-7_55","volume-title":"Advances in Information and Communication","author":"B Cambou","year":"2020","unstructured":"Cambou, B., Philabaum, C., Booher, D., Telesca, D.A.: Response-based cryptographic methods with ternary physical unclonable functions. In: Arai, K., Bhatia, R. (eds.) Advances in Information and Communication, pp. 781\u2013800. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-12385-7_55"},{"key":"60_CR15","doi-asserted-by":"crossref","unstructured":"Chen, A.: Comprehensive assessment of RRAM-based PUF for hardware security applications. In: 2015 IEEE International Electron Devices Meeting (IEDM), pp. 10.7.1\u201310.7.4 (2015)","DOI":"10.1109\/IEDM.2015.7409672"},{"key":"60_CR16","doi-asserted-by":"crossref","unstructured":"Chen, B., Ignatenko, T., Willems, F.M.J., Maes, R., van der Sluis, E., Selimis, G.: A robust SRAM-PUF key generation scheme based on polar codes. In: IEEE Global Communications Conference, pp. 1\u20136 (2017)","DOI":"10.1109\/GLOCOM.2017.8254007"},{"issue":"6","key":"60_CR17","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1109\/TCAD.2014.2370531","volume":"34","author":"J Delvaux","year":"2015","unstructured":"Delvaux, J., Gu, D., Schellekens, D., Verbauwhede, I.: Helper data algorithms for PUF-based key generation: overview and analysis. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 34(6), 889\u2013902 (2015)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circ. Syst."},{"key":"60_CR18","doi-asserted-by":"crossref","unstructured":"Gassend, B., et\u00a0al.: Silicon Physical Randomness. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 148\u2013160 (2002)","DOI":"10.1145\/586110.586132"},{"key":"60_CR19","doi-asserted-by":"publisher","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, GJ., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic Hardware and Embedded Systems, CHES 2007. Lecture Notes in Computer Science, vol. 4727. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_5","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"60_CR20","unstructured":"Gueron, S.: Intel\u00ae Advanced Encryption Standard (AES) New Instructions Set. Technical Report 323641-001, Intel Corporation, May 2010"},{"key":"60_CR21","doi-asserted-by":"crossref","unstructured":"Harary, F., Beckenbach, E.F.: Applied Combinatorial Mathematics (1964)","DOI":"10.2307\/2987401"},{"issue":"8","key":"60_CR22","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","volume":"102","author":"C Herder","year":"2014","unstructured":"Herder, C., Yu, M., Koushanfar, F., Devadas, S.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126\u20131141 (2014)","journal-title":"Proc. IEEE"},{"key":"60_CR23","doi-asserted-by":"crossref","unstructured":"Hiller, M., Merli, D., Stumpf, F., Sigl, G.: Complementary IBS: application specific error correction for PUFs. In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 1\u20136, June 2012","DOI":"10.1109\/HST.2012.6224310"},{"key":"60_CR24","doi-asserted-by":"publisher","unstructured":"Hofer, M., Boehm, C.: An alternative to error correction for SRAM-Like PUFs. In: Mangard, S., Standaert, F.X. (eds.) Cryptographic Hardware and Embedded Systems, CHES 2010. Lecture Notes in Computer Science, vol 6225. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15031-9_23","DOI":"10.1007\/978-3-642-15031-9_23"},{"key":"60_CR25","unstructured":"Holcomb, D.E., Burleson, W.P., Fu, K., et\u00a0al.: Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Proceedings of the Conference on RFID Security, vol. 7, p. 01 (2007)"},{"key":"60_CR26","doi-asserted-by":"crossref","unstructured":"Kang, H., Hori, Y., Katashita, T., Hagiwara, M., Iwamura, K.: Cryptographie key generation from PUF data using efficient fuzzy extractors. In: 16th International Conference on Advanced Communication Technology, pp. 23\u201326, February 2014","DOI":"10.1109\/ICACT.2014.6778915"},{"key":"60_CR27","doi-asserted-by":"crossref","unstructured":"Keller, C., G\u00fcrkaynak, F., Kaeslin, H., Felber, N.: Dynamic memory-based physically unclonable function for the generation of unique identifiers and true random numbers. In: 2014 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 2740\u20132743. IEEE (2014)","DOI":"10.1109\/ISCAS.2014.6865740"},{"key":"60_CR28","unstructured":"Knuth, D.E.: The Art of Computer Programming: Vol. 4, No. 1: Bitwise Tricks and Techniques-Binary Decision Diagrams. Addison Wesley Professional (2009)"},{"key":"60_CR29","unstructured":"Knuth, D.E.: Generating All Combinations and Partitions. Addison-Wesley (2010)"},{"key":"60_CR30","doi-asserted-by":"crossref","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: A soft decision helper data algorithm for SRAM PUFs. In: 2009 IEEE International Symposium on Information Theory, pp. 2101\u20132105, June 2009","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"60_CR31","doi-asserted-by":"publisher","unstructured":"Maes, R., Verbauwhede, I.: Physically unclonable functions: a study on the state of the art and future research directions. In: Sadeghi, A.R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security. Information Security and Cryptography. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14452-3_1","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"60_CR32","doi-asserted-by":"crossref","unstructured":"Mohammadinodoushan, M., Cambou, B., Philabaum, C., Hely, D., Booher, D.: Implementation of password management system using ternary addressable PUF generator. In: IEEE SECON 2019: IEEE STP-CPS Workshop, June 2019","DOI":"10.1109\/SAHCN.2019.8824792"},{"key":"60_CR33","doi-asserted-by":"publisher","unstructured":"Prabhu, P., et al.: Extracting device fingerprints from flash memory by exploiting physical variations. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, AR., Sasse, A., Beres, Y. (eds.) Trust and Trustworthy Computing, Trust 2011. Lecture Notes in Computer Science, vol. 6740. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21599-5_14","DOI":"10.1007\/978-3-642-21599-5_14"},{"issue":"3","key":"60_CR34","first-page":"335","volume":"4","author":"MT Rahman","year":"2016","unstructured":"Rahman, M.T., Rahman, F., Forte, D., Tehranipoor, M.: An aging-resistant RO-PUF for reliable key generation. IEEE Trans. Emerg. Top. Comput. 4(3), 335\u2013348 (2016)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"60_CR35","doi-asserted-by":"crossref","unstructured":"Ro\u017ei\u0107, V., Yang, B., Vliegen, J., Mentens, N., Verbauwhede, I.: The Monte Carlo PUF. In: 2017 27th International Conference on Field Programmable Logic and Applications (FPL), pp. 1\u20136. IEEE (2017)","DOI":"10.23919\/FPL.2017.8056780"},{"key":"60_CR36","doi-asserted-by":"crossref","unstructured":"Schrijen, G.-J., van\u00a0der Leest, V.: Comparative analysis of SRAM memories used as PUF primitives. In: Proceedings of the Conference on Design, Automation and Test in Europe, DATE 2012, San Jose, CA, USA, pp. 1319\u20131324. EDA Consortium (2012)","DOI":"10.1109\/DATE.2012.6176696"},{"key":"60_CR37","doi-asserted-by":"crossref","unstructured":"Sutar, S., Raha, A., Raghunathan, V.: D-PUF: an intrinsically reconfigurable DRAM PUF for device authentication in embedded systems. In: 2016 International Conference on Compliers, Architectures, and Synthesis of Embedded Systems (CASES), pp. 1\u201310. IEEE (2016)","DOI":"10.1145\/2968455.2968519"},{"key":"60_CR38","doi-asserted-by":"crossref","unstructured":"Taniguchi, M., Shiozaki, M., Kubo, H., Fujino, T.: A stable key generation from PUF responses with a fuzzy extractor for cryptographic authentications. In: IEEE 2nd Global Conference on Consumer Electronics (GCCE), pp. 525\u2013527 (2013)","DOI":"10.1109\/GCCE.2013.6664910"},{"issue":"1","key":"60_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2790302","volume":"13","author":"EI Vatajelu","year":"2016","unstructured":"Vatajelu, E.I., Di Natale, G., Barbareschi, M., Torres, L., Indaco, M., Prinetto, P.: STT-MRAM-based PUF architecture exploiting magnetic tunnel junction fabrication-induced variability. J. Emerg. Technol. Comput. Syst. 13(1), 1\u201326 (2016)","journal-title":"J. Emerg. Technol. Comput. Syst."},{"issue":"1","key":"60_CR40","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MDT.2010.25","volume":"27","author":"M Yu","year":"2010","unstructured":"Yu, M., Devadas, S.: Secure and robust error correction for physical unclonable functions. IEEE Des. Test Comput. 27(1), 48\u201365 (2010)","journal-title":"IEEE Des. Test Comput."}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:13:48Z","timestamp":1771658028000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_60","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}