{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T04:47:26Z","timestamp":1727066846645},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319455716"},{"type":"electronic","value":"9783319455723"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45572-3_8","type":"book-chapter","created":{"date-parts":[[2016,8,20]],"date-time":"2016-08-20T08:24:52Z","timestamp":1471681492000},"page":"140-158","source":"Crossref","is-referenced-by-count":12,"title":["An Arbiter PUF Secured by Remote Random Reconfigurations of an FPGA"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Spenke","sequence":"first","affiliation":[]},{"given":"Ralph","family":"Breithaupt","sequence":"additional","affiliation":[]},{"given":"Rainer","family":"Plaga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,21]]},"reference":[{"key":"8_CR1","first-page":"1295","volume":"34","author":"GT Becker","year":"2015","unstructured":"Becker, G.T.: On the pitfalls of using arbiter PUFs as building blocks. IEEE Trans. Inf. Forensics Secur. 34, 1295\u20131307 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Delay-based circuit authentication and applications. In: Proceedings of the 18th Annual ACM Symposium on Applied Computing, pp. 294\u2013301. ACM Digital Library, March 2003","DOI":"10.1145\/952532.952593"},{"issue":"01","key":"8_CR3","doi-asserted-by":"crossref","first-page":"1640002","DOI":"10.1142\/S0218126616400028","volume":"25","author":"S Gehrer","year":"2016","unstructured":"Gehrer, S., Sigl, G.: Using the reconfigurability of modern FPGAs for highly efficient PUF-based key generation. J. Circ. Syst. Comput. 25(01), 1640002 (2016)","journal-title":"J. Circ. Syst. Comput."},{"key":"8_CR4","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/s13389-011-0016-9","volume":"1","author":"S Katzenbeisser","year":"2011","unstructured":"Katzenbeisser, S., Kocabas, \u00dc., van der Leest, V., Sadeghi, A., Schrijen, G., Schr\u00f6der, H., Wachsmann, C.: Recyclable PUFs: logically reconfigurable PUFs. J. Crypt. Eng. 1, 177 (2011)","journal-title":"J. Crypt. Eng."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Lao, Y., Parhi, K.: Novel reconfigurable silicon physical unclonable functions. In: Proceedings of Workshop on Foundations of Dependable and Secure Cyber-Physical Systems (FDSCPS), pp. 30\u201336 (2011)","DOI":"10.1109\/EIT.2011.5978614"},{"key":"8_CR6","unstructured":"Killmann, W., Schindler, W.: A proposal for: functionality classes for random number generators (2011). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Zertifizierung\/Interpretationen\/AIS_20_Functionality_classes_for_random_number_generators_e.html"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Machida, T., Yamamoto, D., Iwamoto, M., Sakiyama, K.: A new mode of operation for arbiter PUF to improve uniqueness on FPGA. In: Proceedings of Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 871\u2013878. IEEE Press, New York (2014)","DOI":"10.15439\/2014F140"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Maes, R.: Physically unclonable functions: constructions, properties and applications. Ph.D. thesis, Katholieke Universiteit Leuven (2012)","DOI":"10.1007\/978-3-642-41395-7_2"},{"key":"8_CR9","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1502781.1502786","volume":"2","author":"M Majzoobi","year":"2009","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Techniques for design and implementation of secure reconfigurable PUFs. ACM Trans. Reconfigurable Technol. Syst. 2, 5 (2009)","journal-title":"ACM Trans. Reconfigurable Technol. Syst."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Devadas, S.: FPGA PUF using programmable delay lines. In: Information Forensics and Security (WIFS), pp. 1\u20136. IEEE Press, New York (2010)","DOI":"10.1109\/WIFS.2010.5711471"},{"key":"8_CR11","unstructured":"Majzoobi, M., Kharaya, A., Koushanfar, F., Devadas, S.: Automated design, implementation, and evaluation of arbiter-based PUF on FPGA using programmable delay lines (2014). http:\/\/eprint.iacr.org\/2014\/639.pdf"},{"key":"8_CR12","unstructured":"Microsemi Corporation SmartFusion2 System-on-Chip FPGAs Product Brief (2013). http:\/\/www.actel.com\/documents\/SmartFusion2_DS.pdf"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1007\/978-3-642-12133-3_37","volume-title":"Reconfigurable Computing: Architectures, Tools and Applications","author":"S Morozov","year":"2010","unstructured":"Morozov, S., Maiti, A., Schaumont, P.: An analysis of delay based PUF implementations on FPGA. In: Sirisuk, P., Morgan, F., El-Ghazawi, T., Amano, H. (eds.) ARC 2010. LNCS, vol. 5992, pp. 382\u2013387. Springer, Heidelberg (2010)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Pappu, R.: Physical one-way functions. Ph.D. thesis, MIT (2001). Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297, 2026\u20132030 (2002)","DOI":"10.1126\/science.1074376"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: ACM Conference on Computer and Communications Security (CCS), pp. 237\u2013249 (2010)","DOI":"10.1145\/1866307.1866335"},{"key":"8_CR16","doi-asserted-by":"crossref","first-page":"1876","DOI":"10.1109\/TIFS.2013.2279798","volume":"8","author":"U R\u00fchrmair","year":"2013","unstructured":"R\u00fchrmair, U., S\u00f6lter, J., Sehnke, F., Xu, X., Mahmoud, A., Stoyanova, V., Dror, G., Schmidhuber, J., Burleson, W., Devadas, S.: PUF modeling attacks on simulated and silicon data. IEEE Trans. Inf. Forensics Secur. 8, 1876\u20131891 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR17","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-14971-4_1","volume-title":"Security System Design and Trustable Computing","author":"U R\u00fchrmair","year":"2016","unstructured":"R\u00fchrmair, U.: Disorder-based security hardware: an overview. In: Chang, C., Potkonjak, M. (eds.) Security System Design and Trustable Computing, pp. 3\u201337. Springer, Cham (2016)"},{"key":"8_CR18","unstructured":"Tajik, S., Dietz, E., Frohmann, S., Dittrich, H., Nedospasov, D., Helfmeier, C., Seifert, J., Boit, C., H\u00fcbers, H.: A complete and linear physical characterization methodology for the arbiter PUFFamily (2015). https:\/\/eprint.iacr.org\/2015\/871"},{"key":"8_CR19","unstructured":"Tarnovsky, C.: Deconstructing a \u201csecure\u201d processor. In: Black Hat Federal 2010, Washington (2010). https:\/\/www.blackhat.com\/presentations\/bh-dc-10\/Tarnovsky_Chris\/BlackHat-DC-2010-Tarnovsky-DASP-slides.pdf"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-319-24837-0_2","volume-title":"RFIDsec 2015","author":"J Tobisch","year":"2015","unstructured":"Tobisch, J., Becker, G.: On the scaling of machine learning attacks on PUFs with application to noise bifurcation. In: Schaumont, P., Mangard, S. (eds.) RFIDsec 2015. LNCS, vol. 9440, pp. 17\u201331. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-24837-0_2"},{"key":"8_CR21","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-3-319-14971-4_3","volume-title":"Security System Design and Trustable Computing","author":"T Xu","year":"2016","unstructured":"Xu, T., Potkonjak, M.: Digital bimodal functions and digital physical unclonable functions: architecture and applications. In: Chang, C., Potkonjak, M. (eds.) Security System Design and Trustable Computing, pp. 83\u2013113. Springer, Cham (2016)"},{"key":"8_CR22","first-page":"39","volume-title":"Security System Design and Trustable Computing","author":"SS Zalikava","year":"2016","unstructured":"Zalikava, S.S., Zhang, L., Klybik, V.P., Ivaniuk, A.A., Chang, C.: Design and implementation of high-quality physical unclonable functions for hardware-oriented cryptography. In: Chang, C., Potkonjak, M. (eds.) Security System Design and Trustable Computing, pp. 39\u201381. Springer, Cham (2016)"},{"key":"8_CR23","first-page":"33","volume":"20","author":"J Zhang","year":"2015","unstructured":"Zhang, J., Lin, Y.: Reconfigurable binding against FPGA replay attacks. ACM Trans. Des. Autom. Electron. Syst. 20, 33 (2015)","journal-title":"ACM Trans. Des. Autom. Electron. Syst."}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45572-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T20:25:04Z","timestamp":1568319904000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45572-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319455716","9783319455723"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45572-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}