{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:40:43Z","timestamp":1764996043310,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319162133"},{"type":"electronic","value":"9783319162140"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16214-0_17","type":"book-chapter","created":{"date-parts":[[2015,3,30]],"date-time":"2015-03-30T22:56:39Z","timestamp":1427756199000},"page":"205-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Efficient SR-Latch PUF"],"prefix":"10.1007","author":[{"given":"Bilal","family":"Habib","sequence":"first","affiliation":[]},{"given":"Jens-Peter","family":"Kaps","sequence":"additional","affiliation":[]},{"given":"Kris","family":"Gaj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,31]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled Physical Random Functions. In: Proc. ACSAC 2002, pp. 149\u2013160 (2002)","DOI":"10.1145\/586110.586132"},{"key":"17_CR2","unstructured":"Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Application. In: Proc. Symposium on VLSI Circuits 2004, pp. 176\u2013159 (2004)"},{"key":"17_CR3","unstructured":"Lim, D.: Extracting Secret Keys from Integrated Circuits. Master\u2019s thesis, MIT, MA, USA (2004)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proc. DAC 2007, pp. 9\u201314 (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Proc. CHES 2007, pp. 63\u201380 (2007)","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Su, Y., Holleman, J., Otis, B.: A 1.6pJ\/bit 96% stable chip-ID generating circuit using process variations. In: Proc. ISSCC 2007, pp. 406\u2013611 (2007)","DOI":"10.1109\/ISSCC.2007.373466"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.-J., Tuyls, P.: Extended abstract: The butterfly PUF protecting IP on every FPGA. In: Proc. HOST 2008, pp. 67\u201370 (2008)","DOI":"10.1109\/HST.2008.4559053"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Morozov, S., Maiti, A., Schaumont, P.: An analysis of delay based PUF implementations on FPGA. In: Proc. ARC 2010, pp. 382\u2013387 (2010)","DOI":"10.1007\/978-3-642-12133-3_37"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s00145-010-9088-4","volume":"24","author":"A Maiti","year":"2010","unstructured":"Maiti, A., Schaumont, P.: Improved Ring oscillator PUF: An FPGA Friendly Secure Primitive. Journal of Cryptology 24, 375\u2013397 (2010)","journal-title":"Journal of Cryptology"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Varchola, M., Drutarovsky, M.: New High Entropy Element for FPGA Based True Random Number Generators. In: Proc. CHES 2010, pp. 351\u2013365 (2010)","DOI":"10.1007\/978-3-642-15031-9_24"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Hospodar, G., Maes, R., Verbauwhede, I.: Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability. In: Proc. WIFS 2012, pp. 37\u201342 (2010)","DOI":"10.1109\/WIFS.2012.6412622"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Maes, R.: Physically Unclonable Functions: Constructions, Properties and Applications. PhD Thesis, KatholiekeUniversiteit Leuven (2012)","DOI":"10.1007\/978-3-642-41395-7"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Varchola, M., Drutarovsky, M., Fischer, V.: New Universal Element with Integrated PUF and TRNG Capability. In: Proc ReConFig 2013, pp. 1\u20136 (2013)","DOI":"10.1109\/ReConFig.2013.6732311"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Habib, B., Gaj, K., Kaps, J.: FPGA PUF Based on Programmable LUT Delays. In: Proc. DSD 2013, pp. 696\u2013704 (2013)","DOI":"10.1109\/DSD.2013.79"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Ganta, D., Nazhandali, L.: Easy-to-build Arbiter Physical Unclonable Function with enhanced challenge\/response set. In: Proc ISQED 2013, pp. 733\u2013738 (2013)","DOI":"10.1109\/ISQED.2013.6523692"},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s13389-012-0044-0","volume":"3","author":"D Yamamoto","year":"2013","unstructured":"Yamamoto, D., Sakiyama, K., Iwamoto, M., Ohta, K., Takenaka, M., Itoh, K.: Variety enhancement of PUF responses using the locations of random outputting RS latches. Journal of Cryptographic Engineering 3, 197\u2013211 (2013)","journal-title":"Journal of Cryptographic Engineering"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Bossuet, L., Ngo, X., Cherif, Z., Fischer, V.: A PUF Based on a Transient Effect Ring Oscillator and Insensitive to Locking Phenomenon. In: Proc. TETC 2013, pp. 30\u201336 (2013)","DOI":"10.1109\/TETC.2013.2287182"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Maiti, A., Gunreddy, V., Schaumont, P.: A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions In: Embedded Systems Design with FPGAs, pp. 245\u2013267. Springer (2013)","DOI":"10.1007\/978-1-4614-1362-2_11"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Kang, H., Hori, Y., Katashita, T., Hagiwara, M., Iwamura, K.: Cryptographic Key Generation from PUF Data Using Efficient Fuzzy Extractors. In: Proc. ICACT 2014, pp. 23\u201326 (2014)","DOI":"10.1109\/ICACT.2014.6778915"},{"key":"17_CR20","unstructured":"http:\/\/www.xilinx.com\/support\/documentation\/data_sheets\/ds162.pdf"}],"container-title":["Lecture Notes in Computer Science","Applied Reconfigurable Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16214-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T23:52:39Z","timestamp":1676937159000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16214-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319162133","9783319162140"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16214-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"31 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}