{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T15:09:18Z","timestamp":1758121758440,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031547690"},{"type":"electronic","value":"9783031547706"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54770-6_8","type":"book-chapter","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T09:03:42Z","timestamp":1709197422000},"page":"183-210","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["X-Lock: A Secure XOR-Based Fuzzy Extractor for\u00a0Resource Constrained Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1123-9212","authenticated-orcid":false,"given":"Edoardo","family":"Liberati","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2747-0737","authenticated-orcid":false,"given":"Alessandro","family":"Visintin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3835-9679","authenticated-orcid":false,"given":"Riccardo","family":"Lazzeretti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9823-3464","authenticated-orcid":false,"given":"Selcuk","family":"Uluagac","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,1]]},"reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-60080-2_1","volume-title":"Cyber Security Cryptography and Machine Learning","author":"D Apon","year":"2017","unstructured":"Apon, D., Cho, C., Eldefrawy, K., Katz, J.: Efficient, Reusable fuzzy extractors from LWE. In: Dolev, S., Lodha, S. (eds.) CSCML 2017. LNCS, vol. 10332, pp. 1\u201318. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60080-2_1"},{"key":"8_CR2","doi-asserted-by":"publisher","unstructured":"Boyen, X.: Reusable cryptographic fuzzy extractors. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 82\u201391. Association for Computing Machinery (2004). https:\/\/doi.org\/10.1145\/1030083.1030096","DOI":"10.1145\/1030083.1030096"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22\u201326, 2005. Proceedings 24, pp. 147\u2013163 (2005)","DOI":"10.1007\/11426639_9"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-540-78967-3_28","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"R Canetti","year":"2008","unstructured":"Canetti, R., Dakdouk, R.R.: Obfuscating point functions with multibit output. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 489\u2013508. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78967-3_28"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-662-49890-3_5","volume-title":"Advances in Cryptology - EUROCRYPT 2016","author":"R Canetti","year":"2016","unstructured":"Canetti, R., Fuller, B., Paneth, O., Reyzin, L., Smith, A.: Reusable fuzzy extractors for low-entropy distributions. In: Fischlin, M., Coron, J.S. (eds.) Advances in Cryptology - EUROCRYPT 2016, pp. 117\u2013146. Springer, Berlin Heidelberg, Berlin, Heidelberg (2016)"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-020-09367-8","volume":"34","author":"R Canetti","year":"2021","unstructured":"Canetti, R., Fuller, B., Paneth, O., Reyzin, L., Smith, A.: Reusable fuzzy extractors for low-entropy distributions. J. Cryptol. 34, 1\u201333 (2021)","journal-title":"J. Cryptol."},{"issue":"3","key":"8_CR7","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCAS.2017.2713305","volume":"17","author":"CH Chang","year":"2017","unstructured":"Chang, C.H., Zheng, Y., Zhang, L.: A retrospective and a look forward: fifteen years of physical unclonable function advancement. IEEE Circuits Syst. Mag. 17(3), 32\u201362 (2017)","journal-title":"IEEE Circuits Syst. Mag."},{"key":"8_CR8","unstructured":"Chen, B., Ignatenko, T., Willems, F., Maes, R., van der Sluis, E., Selimis, G.: High-rate error correction schemes for sram-pufs based on polar codes. arXiv preprint arXiv:1701.07320 (2017)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Jeong, J., Kim, D., Lee, J.: A reusable fuzzy extractor with practical storage size: Modifying canetti et al\u2019.s construction. In: Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11\u201313, 2018, Proceedings 23, pp. 28\u201344 (2018)","DOI":"10.1007\/978-3-319-93638-3_3"},{"issue":"1","key":"8_CR10","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97\u2013139 (2008). https:\/\/doi.org\/10.1137\/060651380","journal-title":"SIAM J. Comput."},{"issue":"2","key":"8_CR11","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Fuller, B., Meng, X., Reyzin, L.: Computational fuzzy extractors. In: Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1\u20135, 2013, Proceedings, Part I 19. pp. 174\u2013193. Springer (2013)","DOI":"10.1007\/978-3-642-42033-7_10"},{"key":"8_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2020.104602","volume":"275","author":"B Fuller","year":"2020","unstructured":"Fuller, B., Meng, X., Reyzin, L.: Computational fuzzy extractors. Inf. Comput. 275, 104602 (2020)","journal-title":"Inf. Comput."},{"key":"8_CR14","unstructured":"Hiller, M.: Key derivation with physical unclonable functions. Ph.D. thesis, Technische Universit\u00e4t M\u00fcnchen (2016)"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Liu, M., Zhou, C., Tang, Q., Parhi, K.K., Kim, C.H.: A data remanence based approach to generate 100% stable keys from an sram physical unclonable function. In: 2017 IEEE\/ACM International Symposium on Low Power Electronics and Design (ISLPED), pp. 1\u20136 (2017)","DOI":"10.1109\/ISLPED.2017.8009192"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-540-24676-3_2","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"B Lynn","year":"2004","unstructured":"Lynn, B., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 20\u201339. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_2"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/978-3-662-48324-4_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"R Maes","year":"2015","unstructured":"Maes, R., van der Leest, V., van der Sluis, E., Willems, F.: Secure key generation from biased PUFs. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 517\u2013534. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_26"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Obermaier, J., Immler, V., Hiller, M., Sigl, G.: A measurement system for capacitive puf-based security enclosures. In: Proceedings of the 55th Annual Design Automation Conference, pp. 1\u20136 (2018)","DOI":"10.1145\/3195970.3195976"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s41635-017-0012-3","volume":"1","author":"MT Rahman","year":"2017","unstructured":"Rahman, M.T., Hosey, A., Guo, Z., Carroll, J., Forte, D., Tehranipoor, M.: Systematic correlation and cell neighborhood analysis of sram puf for robust and unique key generation. J. Hardw. Syst. Secur. 1, 137\u2013155 (2017)","journal-title":"J. Hardw. Syst. Secur."},{"key":"8_CR20","first-page":"148","volume-title":"Physically unclonable functions: Constructions, properties and applications","author":"M Roel","year":"2012","unstructured":"Roel, M.: Physically unclonable functions: Constructions, properties and applications, pp. 148\u2013160. Katholieke Universiteit Leuven, Belgium pp (2012)"},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s10207-019-00456-9","volume":"19","author":"M Seo","year":"2020","unstructured":"Seo, M., Kim, S., Lee, D.H., Park, J.H.: Emblem:(r) lwe-based key encapsulation with a new multi-bit encoding method. Int. J. Inf. Secur. 19, 383\u2013399 (2020)","journal-title":"Int. J. Inf. Secur."},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Shafarevich, I.R., Remizov, A.O.: Linear algebra and geometry. Springer Science & Business Media (2012)","DOI":"10.1007\/978-3-642-30994-6"},{"issue":"2","key":"8_CR23","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/TCSI.2018.2869086","volume":"66","author":"M Suzuki","year":"2018","unstructured":"Suzuki, M., Ueno, R., Homma, N., Aoki, T.: Efficient fuzzy extractors based on ternary debiasing method for biased physically unclonable functions. IEEE Trans. Circuits Syst. I Regul. Pap. 66(2), 616\u2013629 (2018)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"issue":"7","key":"8_CR24","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1109\/TC.2019.2897996","volume":"68","author":"R Ueno","year":"2019","unstructured":"Ueno, R., Suzuki, M., Homma, N.: Tackling biased pufs through biased masking: A debiasing method for efficient fuzzy extractor. IEEE Trans. Comput. 68(7), 1091\u20131104 (2019)","journal-title":"IEEE Trans. Comput."},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Wen, Y., Liu, S.: Reusable fuzzy extractor from lwe. In: Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11\u201313, 2018, Proceedings, pp. 13\u201327 (2018)","DOI":"10.1007\/978-3-319-93638-3_2"},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-030-03332-3_17","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"Y Wen","year":"2018","unstructured":"Wen, Y., Liu, S.: Robustly reusable fuzzy extractor from standard assumptions. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11274, pp. 459\u2013489. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03332-3_17"},{"issue":"6","key":"8_CR27","doi-asserted-by":"publisher","first-page":"1468","DOI":"10.1109\/TIFS.2018.2791341","volume":"13","author":"F Wilde","year":"2018","unstructured":"Wilde, F., Gammel, B.M., Pehl, M.: Spatial correlation analysis on physical unclonable functions. IEEE Trans. Inf. Forensics Secur. 13(6), 1468\u20131480 (2018). https:\/\/doi.org\/10.1109\/TIFS.2018.2791341","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Woo, J., Kim, J., Park, J.H.: Robust and reusable fuzzy extractors from non-uniform learning with errors problem. Comput. Mater. Continua 74(1) (2023)","DOI":"10.32604\/cmc.2023.033102"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54770-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T16:13:39Z","timestamp":1709655219000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54770-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031547690","9783031547706"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54770-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wp.nyu.edu\/acns2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"230","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}