{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:04:36Z","timestamp":1771661076198,"version":"3.50.1"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_67","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"1020-1040","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Tamper Sensitive Ternary ReRAM-Based PUFs"],"prefix":"10.1007","author":[{"given":"Bertrand","family":"Cambou","sequence":"first","affiliation":[]},{"given":"Ying-Chen","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"67_CR1","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","volume":"102","author":"C Herder","year":"2014","unstructured":"Herder, C., Yu, M.-D., Koushanfar, F., Devadas, S.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126\u20131141 (2014)","journal-title":"Proc. IEEE"},{"issue":"4","key":"67_CR2","doi-asserted-by":"publisher","first-page":"763","DOI":"10.3390\/electronics4040763","volume":"2015","author":"Y Jin","year":"2015","unstructured":"Jin, Y.: Introduction to hardware security. Electronics 2015(4), 763\u2013784 (2015). https:\/\/doi.org\/10.3390\/electronics4040763","journal-title":"Electronics"},{"key":"67_CR3","doi-asserted-by":"publisher","unstructured":"Gao, Y., Ranasinghe, D.C., Al-Sarawi, S.F., Kavehei, O., Abbott, D.: Emerging PUF with nanotechnologies. IEEE (2018). https:\/\/doi.org\/10.1109\/ACCESS.2015.2503432","DOI":"10.1109\/ACCESS.2015.2503432"},{"issue":"3","key":"67_CR4","first-page":"335","volume":"4","author":"MT Rahman","year":"2016","unstructured":"Rahman, M.T., Rahman, F., Forte, D., Tehranipoor, M.: An aging-resistant RO-PUF for reliable key generation. IEEE Trans. Emerg. Top. Comp. 4(3), 335\u2013348 (2016)","journal-title":"IEEE Trans. Emerg. Top. Comp."},{"key":"67_CR5","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-319-50380-6_10","volume-title":"Foundations of Hardware IP Protection","author":"B Cambou","year":"2017","unstructured":"Cambou, B.: Enhancing secure elements\u2014technology and architecture. In: Bossuet, L., Torres, L. (eds.) Foundations of Hardware IP Protection, pp. 205\u2013231. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-50380-6_10"},{"key":"67_CR6","doi-asserted-by":"crossref","unstructured":"Becker, G.T., Wild, A., G\u00fcneysu, T.: Security analysis of index-based syndrome coding for PUF-based key generation. In: IEEE HOST (2015)","DOI":"10.1109\/HST.2015.7140230"},{"key":"67_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-14452-3_1","volume-title":"Towards Hardware-Intrinsic Security","author":"R Maes","year":"2010","unstructured":"Maes, R., Verbauwhede, I.: Physically unclonable functions: a study on the state of the art and future research directions. In: Sadeghi, A.R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security, pp. 3\u201337. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14452-3_1"},{"key":"67_CR8","unstructured":"Delavar, M., Mirzakuchaki, S., Ameri, M.H., Mohajeri, J.: PUF based solution for secure communication in advanced metering infrastructure. ACR Publication (2014)"},{"key":"67_CR9","doi-asserted-by":"crossref","unstructured":"Cambou, B., Telesca, D.: Ternary computing to strengthen information assurance, development of ternary state based public key exchange. In: IEEE SAI Computing Conference (2018)","DOI":"10.1007\/978-3-030-01177-2_67"},{"key":"67_CR10","doi-asserted-by":"publisher","first-page":"6","DOI":"10.3390\/cryptography2010006","volume":"2","author":"B Cambou","year":"2018","unstructured":"Cambou, B., Flikkema, P., Palmer, J., Telesca, D., Philabaum, C.: Can ternary computing improve information assurance? Cryptography 2, 6 (2018)","journal-title":"Cryptography"},{"key":"67_CR11","doi-asserted-by":"crossref","unstructured":"Chen, T.I.B., Willems, F.M., Maes, R., Sluis, E., Selimis, G.: A robust SRAM-PUF key generation scheme based on polar codes. arXiv:1701.07320 [cs.IT] (2017)","DOI":"10.1109\/GLOCOM.2017.8254007"},{"key":"67_CR12","doi-asserted-by":"crossref","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: A soft decision helper data algorithm for SRAM PUFs. In: 2009 IEEE International Symposium on Information Theory (2009)","DOI":"10.1109\/ISIT.2009.5205263"},{"issue":"11","key":"67_CR13","first-page":"1","volume":"57","author":"DE Holcomb","year":"2008","unstructured":"Holcomb, D.E., Burleson, W.P., Fu, K.: Power-up SRAM state as an identifying fingerprint and source of TRN. IEEE Trans. Comp. 57(11), 1\u201314 (2008)","journal-title":"IEEE Trans. Comp."},{"key":"67_CR14","unstructured":"Christensen, T.A., Sheets, J.E.: Implementing PUF utilizing EDRAM memory cell capacitance variation. Patent No.: US 8,300,450 B2 (2012)"},{"key":"67_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-642-21599-5_14","volume-title":"Trust and Trustworthy Computing","author":"P Prabhu","year":"2011","unstructured":"Prabhu, P., et al.: Extracting device fingerprints from flash memory by exploiting physical variations. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 188\u2013201. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21599-5_14"},{"key":"67_CR16","unstructured":"Plusquellic, J., Swarup, B.: Systems and methods for generating PUF\u2019s from non-volatile cells. US patent 10,216,965 (2019)"},{"key":"67_CR17","first-page":"1","volume":"13","author":"EI Vatajelu","year":"2015","unstructured":"Vatajelu, E.I., Di Natale, G., Barbareschi, M., Torres, L., Indaco, M., Prinetto, P.: STT-MRAM-based PUF architecture exploiting MTJ fabrication-induced variability. ACM Trans. 13, 1\u201321 (2015)","journal-title":"ACM Trans."},{"key":"67_CR18","doi-asserted-by":"publisher","first-page":"3665","DOI":"10.1109\/TED.2015.2471835","volume":"62","author":"U Chand","year":"2015","unstructured":"Chand, U., Huang, K., Huang, C., Tseng, T.: Mechanism of nonlinear switching in HfO2-based crossbar RRAM with inserting large bandgap tunneling barrier layer. Trans. Electr. Dev. 62, 3665 (2015)","journal-title":"Trans. Electr. Dev."},{"issue":"6","key":"67_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-016-5566-0","volume":"59","author":"B Hudec","year":"2016","unstructured":"Hudec, B., et al.: 3D resistive RAM cell design for high-density storage class memory\u2014a review. Sci. Chin. Inf. Sci. 59(6), 1\u201321 (2016). https:\/\/doi.org\/10.1007\/s11432-016-5566-0","journal-title":"Sci. Chin. Inf. Sci."},{"key":"67_CR20","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1038\/nmat2023","volume":"6","author":"R Waser","year":"2007","unstructured":"Waser, R., Aono, M.: Nanoionics-based resistive switching memories. Nat. Mater. 6, 833 (2007)","journal-title":"Nat. Mater."},{"key":"67_CR21","doi-asserted-by":"crossref","unstructured":"Cappelletti, P.: Non-volatile memory evolution and revolution. In: IEEE International Electron Devices Meeting (IEDM), p. 10.1 (2015)","DOI":"10.1109\/IEDM.2015.7409666"},{"key":"67_CR22","doi-asserted-by":"crossref","unstructured":"Philip Wong, H.-S.: Metal\u2013oxide RRAM. Proc. IEEE 100(6), 1951\u20131970 (2012)","DOI":"10.1109\/JPROC.2012.2190369"},{"key":"67_CR23","doi-asserted-by":"crossref","unstructured":"Chang, Y., et al.: eNVM RRAM reliability performance and modeling in 22FFL FinFET technology. In: IEEE International Reliability Physics Symposium (IRPS), pp. 1\u20134 (2020)","DOI":"10.1109\/IRPS45951.2020.9128359"},{"issue":"8","key":"67_CR24","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1109\/JPROC.2015.2433311","volume":"103","author":"D Wouters","year":"2015","unstructured":"Wouters, D., Waser, R., Wuttig, M.: Phase-change and redox-based resistive switching memories. Proc. IEEE 103(8), 1274\u20131288 (2015)","journal-title":"Proc. IEEE"},{"key":"67_CR25","doi-asserted-by":"crossref","unstructured":"Hsieh, C., et al.: Review of recently progress on neural electronics and memcomputing applications in intrinsic SiOx-based resistive switching memory. In: Memristor and Memristive Neural Networks. IntechOpen (2017)","DOI":"10.5772\/intechopen.68530"},{"issue":"5","key":"67_CR26","doi-asserted-by":"publisher","first-page":"1900189","DOI":"10.1002\/aisy.201900189","volume":"2","author":"R Mostafa","year":"2020","unstructured":"Mostafa, R., et al.: Complementary metal-oxide semiconductor and memristive hardware for neuromorphic computing. Adv. Intell. Syst. 2(5), 1900189 (2020)","journal-title":"Adv. Intell. Syst."},{"key":"67_CR27","unstructured":"Kim, J., et al.: A physical unclonable function with redox-based nanoionic resistive memory. arXiv:1611.04665v1 [cs.ET], 15 November 2016"},{"key":"67_CR28","unstructured":"Adam, G., Nili, H., Kim, J., Hoskins, B., Kavehei, O., Strukov, B.: Utilizing I-V non-linearity and analog state variations in ReRAM-based security primitives. IEEE (2017). ISBN 978-1-5090-5978-2\/17"},{"key":"67_CR29","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10776-018-0391-6","volume":"25","author":"F Afghah","year":"2018","unstructured":"Afghah, F., Cambou, B., Abedini, M., Zeadally, S.: A ReRAM PUF-based approach to enhance authentication security in software defined wireless networks. Int. J. Wireless Inf. Netw. 25, 117\u2013129 (2018)","journal-title":"Int. J. Wireless Inf. Netw."},{"key":"67_CR30","unstructured":"Nili, H., et al.: Highly-secure physically unclonable cryptographic primitives using nonlinear conductance and analog state tuning in memristive crossbar arrays. arXiv:1611.07946v1 [cs.ET] (2016)"},{"key":"67_CR31","unstructured":"Govindaraj, R., Ghosh, S.: A strong arbiter PUF using resistive RAM. IEEE (2016). ISBN 978-1-5090-3076-7\/16"},{"key":"67_CR32","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1109\/TETC.2016.2575448","volume":"5","author":"K Beckmann","year":"2017","unstructured":"Beckmann, K., Manem, H., Cady, N.: Performance enhancement of a time-delay PUF design by utilizing integrated nanoscale ReRAM devices. IEEE Trans. Emerg. Top. Comput. 5, 304\u2013316 (2017)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"67_CR33","doi-asserted-by":"crossref","unstructured":"Rose, G., McDonald, N., Yan, L-K., Wysocki, B.: A write-time based memristive PUF for hardware security applications. In: IEEE\/ACM International Conference on Computer-Aided Design (2013)","DOI":"10.1109\/ICCAD.2013.6691209"},{"key":"67_CR34","unstructured":"Kavehei, O., Hosung, C., Ranasinghe, D., Skafidas, S.: mrPUF: a memristive device based physical unclonable function. arXiv.org > cond-mat > arXiv:1302.2191 (2013)"},{"key":"67_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/978-3-319-28166-7_29","volume-title":"Applied Cryptography and Network Security","author":"Y Gao","year":"2015","unstructured":"Gao, Y., Ranasinghe, D.C., Al-Sarawi, S.F., Kavehei, O., Abbott, D.: mrPUF: a novel memristive device based physical unclonable function. In: Malkin, T., Kolesnikov, V., Lewko, A.B., Polychronakis, M. (eds.) ACNS 2015. LNCS, vol. 9092, pp. 595\u2013615. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-28166-7_29"},{"key":"67_CR36","doi-asserted-by":"crossref","unstructured":"Cambou, B., Orlowski, M.: Design of PUFs with ReRAM and ternary states. In: Proceedings of the Cyber and Information Security Research Conference, Oak Ridge, TN, USA (2016)","DOI":"10.1145\/2897795.2897808"},{"key":"67_CR37","unstructured":"Cambou, B., Afghah, F., Sonderegger, D., Taggart, J., Barnaby, H., Kozicki, M.: Ag conductive bridge RAMs for PUFs. In: IEEE HOST (2017)"},{"key":"67_CR38","doi-asserted-by":"publisher","unstructured":"Chuang, K-H., Degraeve, R., Fantini, A., Groeseneken, G., Linten, D., Verbauwhede, I.: A cautionary note when looking for a truly reconfigurable resistive RAM PUF. In: IACR CHES (2018). ISSN 2569-2925. https:\/\/doi.org\/10.13154\/tches.v2018.i1.98-117","DOI":"10.13154\/tches.v2018.i1.98-117"},{"issue":"3","key":"67_CR39","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1109\/TNANO.2017.2677882","volume":"16","author":"M Mesbah Uddin","year":"2017","unstructured":"Mesbah Uddin, M., Majumder, B., Rose, G.S.: Robustness analysis of a memristive crossbar PUF against modeling attacks. IEEE Trans. Nanotechnol. 16(3), 396\u2013405 (2017). https:\/\/doi.org\/10.1109\/TNANO.2017.2677882","journal-title":"IEEE Trans. Nanotechnol."},{"key":"67_CR40","doi-asserted-by":"crossref","unstructured":"Chen, A.: Comprehensive assessment of RRAM-based PUF for hardware security applications. In: IEDM IEEE (2015). ISBN 978-1-4673-9894-7\/15","DOI":"10.1109\/IEDM.2015.7409672"},{"key":"67_CR41","unstructured":"Shivastava, A.: RRAM based PUF: applications in cryptography, Thesis for Master of Science, Arizona State University (2015)"},{"key":"67_CR42","unstructured":"Sze, S., Ng, K.: Physics of Semiconductor Devices, 3rd edn. Wiley (2007). ISBN 10: 0-471-14323-5"},{"issue":"8","key":"67_CR43","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1149\/2.0061808jss","volume":"7","author":"Y Chen","year":"2018","unstructured":"Chen, Y., Huang, H., Lin, C., Kim, S., Chang, Y., Lee, J.: Effects of ambient sensing on SiOx-based resistive switching and resilience modulation by stacking engineering. ECS J. Solid-State Sci. Technol. 7(8), 350 (2018)","journal-title":"ECS J. Solid-State Sci. Technol."},{"key":"67_CR44","doi-asserted-by":"crossref","unstructured":"Chen, Y., Lin, C., Hu, S., Lin, C., Fowler, B., Lee, J.: A novel resistive switching identification method through relaxation characteristics for sneak-path-constrained selectorless RRAM application. Sci. Rep. 9(1), 1\u20136 (2019)","DOI":"10.1038\/s41598-019-48932-5"},{"issue":"6","key":"67_CR45","doi-asserted-by":"publisher","first-page":"3499","DOI":"10.1007\/s11664-020-07987-1","volume":"49","author":"Y-C Chen","year":"2020","unstructured":"Chen, Y.-C., Lin, C.-Y., Cho, H., Kim, S., Fowler, B., Lee, J.C.: Current-sweep operation on nonlinear selectorless RRAM for multilevel cell applications. J. Electron. Mater. 49(6), 3499\u20133503 (2020). https:\/\/doi.org\/10.1007\/s11664-020-07987-1","journal-title":"J. Electron. Mater."},{"key":"67_CR46","doi-asserted-by":"crossref","unstructured":"Delvaux, J., Gu, D., Schellekens, D., Verbauwhede, I.: Helper data algorithms for PUF-based key generation: overview and analysis. In: IEEE CAD-ICS (2015)","DOI":"10.1109\/TCAD.2014.2370531"},{"key":"67_CR47","doi-asserted-by":"crossref","unstructured":"Korenda, A., Afghah, F, Cambou, B.: A secret key generation scheme for internet of things using ternary-states ReRAM-based PUFs. In: IWCMC (2018)","DOI":"10.1109\/IWCMC.2018.8450341"},{"key":"67_CR48","doi-asserted-by":"crossref","unstructured":"Taniguchi, M., Shiozaki, M., Kubo, H., Fujino, T.: A stable key generation from PUF responses with a fuzzy extractor for cryptographic authentications. In: IEEE GCCE (2013)","DOI":"10.1109\/GCCE.2013.6664910"},{"key":"67_CR49","doi-asserted-by":"crossref","unstructured":"Cambou, B., Philabaum, C., Booher, D., Telesca. D.: Response-based cryptographic methods with ternary physical unclonable functions. In: 2019 SAI FICC. IEEE (2019)","DOI":"10.1007\/978-3-030-12385-7_55"},{"key":"67_CR50","unstructured":"Cambou, B.: Unequally powered cryptography with PUFs for networks of IoTs. In: IEEE Spring Simulation Conference (2019)"},{"key":"67_CR51","doi-asserted-by":"crossref","unstructured":"Kang, H., Hori, Y., Katashita, T., Hagiwara, M., Iwamura, K.: Cryptography key generation from PUF data using efficient fuzzy extractors. In: International Conference on ACT (2014)","DOI":"10.1109\/ICACT.2014.6778915"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:14:07Z","timestamp":1771658047000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_67","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}