{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T16:09:39Z","timestamp":1778947779816,"version":"3.51.4"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319034904","type":"print"},{"value":"9783319034911","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03491-1_3","type":"book-chapter","created":{"date-parts":[[2013,11,25]],"date-time":"2013-11-25T00:47:31Z","timestamp":1385340451000},"page":"36-52","source":"Crossref","is-referenced-by-count":18,"title":["A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions"],"prefix":"10.1007","author":[{"given":"Patrick","family":"Koeberl","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiangtao","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/978-3-642-10366-7_40","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"F. Armknecht","year":"2009","unstructured":"Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., Tuyls, P.: Memory leakage-resilient encryption based on physically unclonable functions. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 685\u2013702. Springer, Heidelberg (2009)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"B\u00f6hm, C., Hofer, M., Pribyl, W.: A microcontroller SRAM-PUF. In: 5th International Conference on Network and System Security, pp. 269\u2013273. IEEE (2011)","DOI":"10.1109\/ICNSS.2011.6060013"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-85053-3_12","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"C. B\u00f6sch","year":"2008","unstructured":"B\u00f6sch, C., Guajardo, J., Sadeghi, A.-R., Shokrollahi, J., Tuyls, P.: Efficient helper data key extractor on FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 181\u2013197. Springer, Heidelberg (2008)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-22792-9_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"C. Brzuska","year":"2011","unstructured":"Brzuska, C., Fischlin, M., Schr\u00f6der, H., Katzenbeisser, S.: Physically uncloneable functions in the universal composition framework. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol.\u00a06841, pp. 51\u201370. Springer, Heidelberg (2011)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"key":"3_CR6","first-page":"148","volume-title":"ACM Conference on Computer and Communications Security","author":"B. Gassend","year":"2002","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security, pp. 148\u2013160. ACM Press, New York (2002)"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J. Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 63\u201380. Springer, Heidelberg (2007)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: ACM Conference on Computer and Communications Security (CCS), pp. 28\u201336. ACM (1999)","DOI":"10.1145\/319709.319714"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-33027-8_17","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"S. Katzenbeisser","year":"2012","unstructured":"Katzenbeisser, S., Kocaba\u015f, \u00dc., Ro\u017ei\u0107, V., Sadeghi, A.-R., Verbauwhede, I., Wachsmann, C.: PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions\u00a0(PUFs) cast in silicon. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol.\u00a07428, pp. 283\u2013301. Springer, Heidelberg (2012)"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-642-21599-5_5","volume-title":"Trust and Trustworthy Computing","author":"P. Koeberl","year":"2011","unstructured":"Koeberl, P., Li, J., Rajan, A., Vishik, C., Wu, W.: A practical device authentication scheme using SRAM PUFS. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) TRUST 2011. LNCS, vol.\u00a06740, pp. 63\u201377. Springer, Heidelberg (2011)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.J., Tuyls, P.: The butterfly PUF: Protecting IP on every FPGA. In: IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), pp. 67\u201370 (June 2008)","DOI":"10.1109\/HST.2008.4559053"},{"key":"3_CR12","unstructured":"Lee, J.W., Lim, D., Gassend, B., Edward Suh, G., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication application. In: Proceedings of the Symposium on VLSI Circuits, pp. 176\u2013179 (2004)"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-642-33027-8_16","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"V. Leest van der","year":"2012","unstructured":"van der Leest, V., Preneel, B., van der Sluis, E.: Soft decision error correction for compact memory-based PUFS using a single enrollment. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol.\u00a07428, pp. 268\u2013282. Springer, Heidelberg (2012)"},{"issue":"10","key":"3_CR14","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D. Lim","year":"2005","unstructured":"Lim, D., Lee, J.W., Gassend, B., Edward Suh, G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems\u00a013(10), 1200\u20131205 (2005)","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Maes, R., Rozic, V., Verbauwhede, I., Koeberl, P., van der Sluis, E., van der Leest, V.: Experimental evaluation of physically unclonable functions in 65 nm cmos. In: 2012 Proceedings of the ESSCIRC (ESSCIRC), pp. 486\u2013489 (September 2012)","DOI":"10.1109\/ESSCIRC.2012.6341361"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-642-33027-8_18","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"R. Maes","year":"2012","unstructured":"Maes, R., Van Herrewege, A., Verbauwhede, I.: PUFKY: A fully functional PUF-based cryptographic key generator. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol.\u00a07428, pp. 302\u2013319. Springer, Heidelberg (2012)"},{"key":"3_CR17","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic PUFs from flip-flops on reconfigurable devices. In: 3rd Benelux Workshop on Information and System Security (WISSec 2008), Eindhoven, NL, p. 17 (2008)"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-04138-9_24","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"R. Maes","year":"2009","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 332\u2013347. Springer, Heidelberg (2009)"},{"key":"3_CR19","unstructured":"Pappu, R.S.: Physical one-way functions. PhD thesis, Massachusetts Institute of Technology (March 2001)"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Simons, P., van der Sluis, E., van der Leest, V.: Buskeeper PUFs, a promising alternative to D Flip-Flop PUFs. In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 7\u201312 (June 2012)","DOI":"10.1109\/HST.2012.6224311"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/11894063_25","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"E. Simpson","year":"2006","unstructured":"Simpson, E., Schaumont, P.: Offline hardware\/Software authentication for reconfigurable platforms. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 311\u2013323. Springer, Heidelberg (2006)"},{"key":"3_CR22","first-page":"9","volume-title":"Design Automation Conference","author":"G. Edward Suh","year":"2007","unstructured":"Edward Suh, G., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference, pp. 9\u201314. ACM Press, New York (2007)"},{"issue":"1","key":"3_CR23","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MDT.2010.25","volume":"27","author":"M.-D. Yu","year":"2010","unstructured":"Yu, M.-D., Devadas, S.: Secure and robust error correction for physical unclonable functions. IEEE Design Test of Computers\u00a027(1), 48\u201365 (2010)","journal-title":"IEEE Design Test of Computers"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03491-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T18:22:48Z","timestamp":1558722168000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-03491-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319034904","9783319034911"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03491-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}