{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:09:35Z","timestamp":1725851375779},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319304809"},{"type":"electronic","value":"9783319304816"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-30481-6_15","type":"book-chapter","created":{"date-parts":[[2016,3,12]],"date-time":"2016-03-12T08:09:38Z","timestamp":1457770178000},"page":"183-194","source":"Crossref","is-referenced-by-count":0,"title":["A Comprehensive Set of Schemes for PUF Response Generation"],"prefix":"10.1007","author":[{"given":"Bilal","family":"Habib","sequence":"first","affiliation":[]},{"given":"Kris","family":"Gaj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,13]]},"reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s00145-010-9088-4","volume":"24","author":"A Maiti","year":"2010","unstructured":"Maiti, A., Schaumont, P.: Improved ring oscillator PUF: an FPGA friendly secure primitive. J. Cryptology 24(2), 375\u2013397 (2010)","journal-title":"J. Cryptology"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Hori, Y., Yoshida, T., Katashita, T., Satoh, A.: Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs. In: Proceedings of International Conference on Recongurable Computing and FPGAs (ReConFig) 2010, pp. 298\u2013303 (2010)","DOI":"10.1109\/ReConFig.2010.24"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-642-33027-8_18","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"R Maes","year":"2012","unstructured":"Maes, R., Van Herrewege, A., Verbauwhede, I.: PUFKY: a fully functional PUF-based cryptographic key generator. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 302\u2013319. Springer, Heidelberg (2012)"},{"issue":"1","key":"15_CR4","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/TIFS.2011.2165540","volume":"7","author":"A Maiti","year":"2012","unstructured":"Maiti, A., Kim, I., Schaumont, P.: A robust physical unclonable function with en-hanced challenge-response set. IEEE Trans. Inf. Forensics Secur. 7(1), 333\u2013345 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Ganta, D., Nazhandali, L.: Easy-to-build arbiter physical unclonable function with enhanced challenge\/response set. In: 14th International Symposium on Quality Electronic Design Proceedings of Quality Electronic Design (ISQED) (2013)","DOI":"10.1109\/ISQED.2013.6523692"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-1-4614-1362-2_11","volume-title":"Embedded Systems Design with FPGAs","author":"A Maiti","year":"2013","unstructured":"Maiti, A., Gunreddy, V., Schaumont, P.: A systematic method to evaluate and compare the performance of physical unclonable functions. In: Athanas, P., Pnevmatikatos, D., Sklavos, N. (eds.) Embedded Systems Design with FPGAs, pp. 245\u2013267. Springer, New York (2013)"},{"key":"15_CR7","unstructured":"http:\/\/rijndael.ece.vt.edu\/puf\/detailed.php"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-319-16214-0_17","volume-title":"Applied Reconfigurable Computing","author":"B Habib","year":"2015","unstructured":"Habib, B., Kaps, J.-P., Gaj, K.: Efficient SR-latch PUF. In: Sano, K., Soudris, D., H\u00fcbner, M., Diniz, P. (eds.) ARC 2015. LNCS, vol. 9040, pp. 205\u2013216. Springer, Heidelberg (2015)"},{"key":"15_CR9","unstructured":"https:\/\/staff.aist.go.jp\/hori.y\/en\/puf\/index.html"},{"key":"15_CR10","unstructured":"https:\/\/cryptography.gmu.edu\/puf"}],"container-title":["Lecture Notes in Computer Science","Applied Reconfigurable Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-30481-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:25:08Z","timestamp":1559413508000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-30481-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319304809","9783319304816"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-30481-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}