{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:25:33Z","timestamp":1762323933380},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319308395"},{"type":"electronic","value":"9783319308401"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-30840-1_22","type":"book-chapter","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T09:15:22Z","timestamp":1457514922000},"page":"345-358","source":"Crossref","is-referenced-by-count":11,"title":["Let Me Prove It to You: RO PUFs Are Provably Learnable"],"prefix":"10.1007","author":[{"given":"Fatemeh","family":"Ganji","sequence":"first","affiliation":[]},{"given":"Shahin","family":"Tajik","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,10]]},"reference":[{"key":"22_CR1","volume-title":"Computational Learning Theory","author":"M Anthony","year":"1997","unstructured":"Anthony, M.: Computational Learning Theory. Cambridge University Press, Cambridge (1997)"},{"doi-asserted-by":"crossref","unstructured":"Blumer, A., Ehrenfeucht, A., Haussler, D., Warmuth, M.: Classifying learnable geometric concepts with the vapnik-chervonenkis dimension. In: Proceedings of the Eighteenth Annual ACM Symposium on Theory of computing, pp. 273\u2013282. ACM (1986)","key":"22_CR2","DOI":"10.1145\/12130.12158"},{"doi-asserted-by":"crossref","unstructured":"Ganji, F., Kr\u00e4mer, J., Seifert, J.P., Tajik, S.: Lattice basis reduction attack against physically unclonable functions. In: Proceedings of the 22nd ACM Conference on Computer and Communications Security. ACM (2015)","key":"22_CR3","DOI":"10.1145\/2810103.2813723"},{"unstructured":"Ganji, F., Tajik, S., Seifert, J.P.: PAC Learning of Arbiter PUFs, Security Proofs for Embedded Systems-PROOFS (2014). \n                      https:\/\/eprint.iacr.org\/2015\/378.pdf","key":"22_CR4"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-319-22846-4_2","volume-title":"Trust and Trustworthy Computing","author":"F Ganji","year":"2015","unstructured":"Ganji, F., Tajik, S., Seifert, J.-P.: Why attackers win: on the learnability of XOR arbiter PUFs. In: Conti, M., Schunter, M., Askoxylakis, I. (eds.) TRUST 2015. LNCS, vol. 9229, pp. 22\u201339. Springer, Heidelberg (2015)"},{"doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., Van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 148\u2013160. ACM (2002)","key":"22_CR6","DOI":"10.1145\/586110.586132"},{"issue":"1","key":"22_CR7","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newslett. 11(1), 10\u201318 (2009)","journal-title":"ACM SIGKDD Explor. Newslett."},{"doi-asserted-by":"crossref","unstructured":"Helfmeier, C., Nedospasov, D., Tarnovsky, C., Krissler, J.S., Boit, C., Seifert, J.P.: Breaking and entering through the silicon. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 733\u2013744. ACM (2013)","key":"22_CR8","DOI":"10.1145\/2508859.2516717"},{"issue":"8","key":"22_CR9","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","volume":"102","author":"C Herder","year":"2014","unstructured":"Herder, C., Yu, M.D., Koushanfar, F., Devadas, S.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126\u20131141 (2014)","journal-title":"Proc. IEEE"},{"key":"22_CR10","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3897.001.0001","volume-title":"An Introduction to Computational Learning Theory","author":"MJ Kearns","year":"1994","unstructured":"Kearns, M.J., Vazirani, U.V.: An Introduction to Computational Learning Theory. MIT press, Cambridge (1994)"},{"unstructured":"K\u00f6mmerling, O., Kuhn, M.: Design principles for tamper-resistant security processors. In: USENIX Workshop on Smartcard Technology (1999)","key":"22_CR11"},{"key":"22_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41395-7","volume-title":"Physically Unclonable Functions: Constructions, Properties and Applications","author":"R Maes","year":"2013","unstructured":"Maes, R.: Physically Unclonable Functions: Constructions, Properties and Applications. Springer, Heidelberg (2013)"},{"key":"22_CR13","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-14452-3_1","volume-title":"Towards Hardware-Intrinsic Security","author":"R Maes","year":"2010","unstructured":"Maes, R., Verbauwhede, I.: Physically unclonable functions: a study on the state of the art and future research directions. In: Sadeghi, A.-R., Naccach, D. (eds.) Towards Hardware-Intrinsic Security. Information Security and Cryptography, pp. 3\u201337. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Maiti, A., Casarona, J., McHale, L., Schaumont, P.: A large scale characterization of RO-PUF. In: 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 94\u201399 (2010)","key":"22_CR14","DOI":"10.1109\/HST.2010.5513108"},{"issue":"1","key":"22_CR15","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/TIFS.2011.2165540","volume":"7","author":"A Maiti","year":"2012","unstructured":"Maiti, A., Kim, I., Schaumont, P.: A robust physical unclonable function with enhanced challenge-response set. IEEE Trans. Inf. Forensics Secur. 7(1), 333\u2013345 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Maiti, A., Schaumont, P.: Improving the quality of a physical unclonable function using configurable ring oscillators. In: International Conference on Field Programmable Logic and Applications, FPL 2009, pp. 703\u2013707. IEEE (2009)","key":"22_CR16","DOI":"10.1109\/FPL.2009.5272361"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-21599-5_3","volume-title":"Trust and Trustworthy Computing","author":"D Merli","year":"2011","unstructured":"Merli, D., Schuster, D., Stumpf, F., Sigl, G.: Side-channel analysis of PUFs and fuzzy extractors. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 33\u201347. Springer, Heidelberg (2011)"},{"issue":"1","key":"22_CR18","first-page":"95","volume":"9","author":"KC Mugali","year":"2015","unstructured":"Mugali, K.C., Patil, M.M.: A novel technique of configurable ring oscillator for physical unclonable functions. Int. J. Comput. Eng. Appl. 9(1), 95\u2013100 (2015)","journal-title":"Int. J. Comput. Eng. Appl."},{"doi-asserted-by":"crossref","unstructured":"Nguyen, P.H., Sahoo, D.P., Chakraborty, R.S., Mukhopadhyay, D.: Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set. In: Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, pp. 641\u2013646. EDA Consortium (2015)","key":"22_CR19","DOI":"10.7873\/DATE.2015.0699"},{"issue":"5589","key":"22_CR20","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026\u20132030 (2002)","journal-title":"Science"},{"issue":"3","key":"22_CR21","first-page":"229","volume":"2","author":"RL Rivest","year":"1987","unstructured":"Rivest, R.L.: Learning decision lists. Mach. Learn. 2(3), 229\u2013246 (1987)","journal-title":"Mach. Learn."},{"doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 237\u2013249. ACM (2010)","key":"22_CR22","DOI":"10.1145\/1866307.1866335"},{"key":"22_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1007\/978-3-662-44709-3_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"U R\u00fchrmair","year":"2014","unstructured":"R\u00fchrmair, U., Xu, X., S\u00f6lter, J., Mahmoud, A., Majzoobi, M., Koushanfar, F., Burleson, W.: Efficient power and timing side channels for physical unclonable functions. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 476\u2013492. Springer, Heidelberg (2014)"},{"doi-asserted-by":"crossref","unstructured":"Saha, I., Jeldi, R.R., Chakraborty, R.S.: Model building attacks on physically unclonable functions using genetic programming. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 41\u201344. IEEE (2013)","key":"22_CR24","DOI":"10.1109\/HST.2013.6581563"},{"unstructured":"Secure Embedded Systems (SES) Lab at Virginia Tech: On-chip Variability Datafor PUFs. \n                      http:\/\/rijndael.ece.vt.edu\/puf\/artifacts.html","key":"22_CR25"},{"doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th Annual Design Automation Conference, pp. 9\u201314. ACM (2007)","key":"22_CR26","DOI":"10.1109\/DAC.2007.375043"},{"key":"22_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1007\/978-3-662-44709-3_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"S Tajik","year":"2014","unstructured":"Tajik, S., Dietz, E., Frohmann, S., Seifert, J.-P., Nedospasov, D., Helfmeier, C., Boit, C., Dittrich, H.: Physical characterization of arbiter PUFs. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 493\u2013509. Springer, Heidelberg (2014)"},{"doi-asserted-by":"crossref","unstructured":"Tajik, S., Lohrke, H., Ganji, F., Seifert, J.P., Boit, C.: Laser fault attack on physically unclonable functions. In: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (2015)","key":"22_CR28","DOI":"10.1109\/FDTC.2015.19"},{"doi-asserted-by":"crossref","unstructured":"Yu, M.D., Sowell, R., Singh, A., M\u2019Raihi, D., Devadas, S.: Performance metrics and empirical results of a puf cryptographic key generation ASIC. In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 108\u2013115. IEEE (2012)","key":"22_CR29","DOI":"10.1109\/HST.2012.6224329"},{"unstructured":"Yu, M.-D.M., Devadas, S.: Recombination of physical unclonable functions(2010)","key":"22_CR30"},{"key":"22_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-642-23951-9_24","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"M-DM Yu","year":"2011","unstructured":"Yu, M.-D.M., M\u2019Raihi, D., Sowell, R., Devadas, S.: Lightweight and secure PUF key storage using limits of machine learning. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 358\u2013373. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-30840-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:53:44Z","timestamp":1559397224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-30840-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319308395","9783319308401"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-30840-1_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}