{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:41:05Z","timestamp":1740098465697,"version":"3.37.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319494449"},{"type":"electronic","value":"9783319494456"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49445-6_12","type":"book-chapter","created":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T07:50:31Z","timestamp":1479369031000},"page":"213-232","source":"Crossref","is-referenced-by-count":9,"title":["Predictive Aging of Reliability of Two Delay PUFs"],"prefix":"10.1007","author":[{"given":"Naghmeh","family":"Karimi","sequence":"first","affiliation":[]},{"given":"Jean-Luc","family":"Danger","sequence":"additional","affiliation":[]},{"given":"Florent","family":"Lozac\u2019h","sequence":"additional","affiliation":[]},{"given":"Sylvain","family":"Guilley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,18]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled physical random functions. In: Computer Security Applications Conference, pp. 149\u2013160 (2002)","DOI":"10.1109\/CSAC.2002.1176287"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference (DAC), pp. 9\u201314 (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63\u201380. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74735-2_5"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Rahman, M.T., Forte, D., Fahrny, J., Tehranipoor, M.: ARO-PUF: An aging-resistant ring oscillator PUF design. In: Design, Automation Test in Europe Conference (DATE), pp. 1\u20136 (2014)","DOI":"10.7873\/DATE2014.082"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Cherif, Z., Danger, J., Guilley, S., Bossuet, L.: An easy-to-design PUF based on a single oscillator: the loop PUF. In: Digital System Design (DSD), pp. 156\u2013162 (2012)","DOI":"10.1109\/DSD.2012.22"},{"issue":"5","key":"12_CR6","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1109\/JSSC.1989.572629","volume":"24","author":"MJ Pelgrom","year":"1989","unstructured":"Pelgrom, M.J., Duinmaijer, A.C., Welbers, A.P.: Matching properties of MOS transistors. IEEE J. Solid State Circ. 24(5), 1433\u20131439 (1989)","journal-title":"IEEE J. Solid State Circ."},{"issue":"9","key":"12_CR7","doi-asserted-by":"crossref","first-page":"1198","DOI":"10.1109\/TC.2008.212","volume":"58","author":"DE Holcomb","year":"2009","unstructured":"Holcomb, D.E., Burleson, W.P., Fu, K.: Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 58(9), 1198\u20131210 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-642-12133-3_37","volume-title":"Reconfigurable Computing: Architectures, Tools and Applications","author":"S Morozov","year":"2010","unstructured":"Morozov, S., Maiti, A., Schaumont, P.: An analysis of delay based puf implementations on FPGA. In: Sirisuk, P., Morgan, F., El-Ghazawi, T., Amano, H. (eds.) ARC 2010. LNCS, vol. 5992, pp. 382\u2013387. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-12133-3_37"},{"issue":"5","key":"12_CR9","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1109\/TED.2007.893809","volume":"54","author":"H Kufluoglu","year":"2007","unstructured":"Kufluoglu, H., Alam, M.A.: A generalized reaction-diffusion model with explicit H-H2 dynamics for Negative-Bias Temperature-Instability (NBTI) degradation. IEEE Trans. Electron Devices 54(5), 1101\u20131107 (2007)","journal-title":"IEEE Trans. Electron Devices"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Lu, Y., Shang, L., Zhou, H., Zhu, H., Yang, F., Zeng, X.: Statistical reliability analysis under process variation and aging effects. In: Design Automation Conference (DAC), pp. 514\u2013519, July 2009","DOI":"10.1145\/1629911.1630044"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Chakravarthi, S., Krishnan, A., Reddy, V., Machala, C.F., Krishnan, S.: A comprehensive framework for predictive modeling of negative bias temperature instability. In: Reliability Physics Symposium, pp. 273\u2013282 (2004)","DOI":"10.1109\/RELPHY.2004.1315337"},{"issue":"7","key":"12_CR12","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/LED.2006.876310","volume":"27","author":"D Saha","year":"2006","unstructured":"Saha, D., Varghese, D., Mahapatra, S.: Role of anode hole injection and valence band hole tunneling on interface trap generation during hot carrier injection stress. IEEE Electron Device Lett. 27(7), 585\u2013587 (2006)","journal-title":"IEEE Electron Device Lett."},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Rodriguez, R., Stathis, J., Linder, B.: Modeling and experimental verification of the effect of gate oxide breakdown on CMOS inverters. In: IEEE Int\u2019l Reliability Physics Symposium, pp. 11\u201316 (2003)","DOI":"10.1109\/RELPHY.2003.1197713"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Sinanoglu, O., Karimi, N., Rajendran, J., Karri, R., Jin, Y., Huang, K., Makris, Y.: Reconciling the IC test and security dichotomy. In: European Test Symposium (ETS), pp. 1\u20136 (2013)","DOI":"10.1109\/ETS.2013.6569368"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Khan, S., Haron, N.Z., Hamdioui, S., Catthoor, F.: NBTI monitoring and design for reliability in nanoscale circuits. In: Int\u2019l Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), pp. 68\u201376 (2011)","DOI":"10.1109\/DFT.2011.49"},{"issue":"5","key":"12_CR16","doi-asserted-by":"crossref","first-page":"914","DOI":"10.1016\/j.microrel.2010.12.015","volume":"51","author":"J-S Yuan","year":"2011","unstructured":"Yuan, J.-S., Yeh, W.-K., Chen, S., Hsu, C.-W.: NBTI reliability on high-k metal-gate SiGe transistor and circuit performances. Microelectron. Reliab. 51(5), 914\u2013918 (2011)","journal-title":"Microelectron. Reliab."},{"issue":"1","key":"12_CR17","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MDT.2010.25","volume":"27","author":"M Yu","year":"2010","unstructured":"Yu, M., Devadas, S.: Secure and robust error correction for physical unclonable functions. Des. Test of Comput. 27(1), 48\u201365 (2010)","journal-title":"Des. Test of Comput."},{"key":"12_CR18","unstructured":"Kirkpatrick, M.S., Bertino, E.: Software techniques to combat drift in PUF-based authentication systems. In: Workshop on Secure Component and System Identification (SECSI), p. 9 (2010)"},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63\u201380. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74735-2_5"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Maes, R., van der Leest, V.: Countering the effects of silicon aging on SRAM PUFs. In: Hardware-Oriented Security and Trust (HOST), pp. 148\u2013153 (2014)","DOI":"10.1109\/HST.2014.6855586"},{"issue":"9","key":"12_CR21","doi-asserted-by":"crossref","first-page":"1854","DOI":"10.1109\/TVLSI.2013.2279875","volume":"22","author":"A Maiti","year":"2014","unstructured":"Maiti, A., Schaumont, P.: The impact of aging on a physical unclonable function. IEEE Trans. Very Large Scale Integr. Syst. 22(9), 1854\u20131864 (2014)","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"key":"12_CR22","unstructured":"Synopsys. HSPICE User Guide: Basic Simulation and Analysis (2016)"},{"issue":"8","key":"12_CR23","doi-asserted-by":"crossref","first-page":"777","DOI":"10.17485\/ijst\/2015\/v8i8\/68115","volume":"8","author":"KK Kim","year":"2015","unstructured":"Kim, K.K.: On-chip delay degradation measurement for aging compensation. Indian J. Sci. Technol. 8(8), 777\u2013782 (2015)","journal-title":"Indian J. Sci. Technol."},{"issue":"9\u201311","key":"12_CR24","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1016\/j.microrel.2013.07.044","volume":"53","author":"C Nunes","year":"2013","unstructured":"Nunes, C., Butzen, P.F., Reis, A.I., Ribas, R.P.: BTI, HCI and TDDB aging impact in flip-flops. Microelectron. Reliab. 53(9\u201311), 1355\u20131359 (2013)","journal-title":"Microelectron. Reliab."},{"key":"12_CR25","unstructured":"Mizan, E.: Efficient fault tolerance for pipelined structures and its application to superscalar and dataflow machines. Ph.D. thesis, Electrical and Computer Engineering Department, University of Texas At Austin (2008)"},{"issue":"6","key":"12_CR26","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1016\/j.microrel.2006.10.012","volume":"47","author":"MA Alam","year":"2007","unstructured":"Alam, M.A., Kufluoglu, H., Varghese, D., Mahapatra, S.: A comprehensive model for PMOS NBTI degradation: Recent progress. Microelectron. Reliab. 47(6), 853\u2013862 (2007)","journal-title":"Microelectron. Reliab."},{"issue":"7","key":"12_CR27","doi-asserted-by":"crossref","first-page":"1583","DOI":"10.1109\/TED.2006.876041","volume":"53","author":"S Mahapatra","year":"2006","unstructured":"Mahapatra, S., Saha, D., Varghese, D., Kumar, P.: On the generation and recovery of interface traps in MOSFETs subjected to NBTI, FN, and HCI stress. IEEE Trans. Electron Devices 53(7), 1583\u20131592 (2006)","journal-title":"IEEE Trans. Electron Devices"},{"issue":"6","key":"12_CR28","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1016\/j.microrel.2006.10.006","volume":"47","author":"DK Schroder","year":"2007","unstructured":"Schroder, D.K.: Negative bias temperature instability: What do we understand? Microelectron. Reliab. 47(6), 841\u2013852 (2007)","journal-title":"Microelectron. Reliab."},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Cha, S., Chen, C.-C., Liu, T., Milor, L.S.: Extraction of threshold voltage degradation modeling due to negative bias temperature instability in circuits with I\/O measurements. In: VLSI Test Symposium (VTS), pp. 1\u20136 (2014)","DOI":"10.1109\/VTS.2014.6818769"},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-1-4614-4078-9_6","volume-title":"Circuit Design for Reliability","author":"KB Sutaria","year":"2015","unstructured":"Sutaria, K.B., Velamala, J.B., Ramkumar, A., Cao, Y.: Compact modeling of BTI for circuit reliability analysis. In: Reis, R., Cao, Y., Wirth, G. (eds.) Circuit Design for Reliability, pp. 93\u2013119. Springer, Heidelberg (2015). doi: 10.1007\/978-1-4614-4078-9_6"},{"issue":"2","key":"12_CR31","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1109\/TVLSI.2008.2008810","volume":"18","author":"W Wang","year":"2010","unstructured":"Wang, W., Yang, S., Bhardwaj, S., Vrudhula, S., Liu, F., Cao, Y.: The impact of NBTI effect on combinational circuit: modeling, simulation, and analysis. IEEE Trans. Very Large Scale Integr. Syst. 18(2), 173\u2013183 (2010)","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"issue":"6","key":"12_CR32","doi-asserted-by":"crossref","first-page":"987","DOI":"10.1109\/TVLSI.2010.2043694","volume":"19","author":"Y Ye","year":"2011","unstructured":"Ye, Y., Liu, F., Chen, M., Nassif, S., Cao, Y.: Statistical modeling and simulation of threshold variation under random dopant fluctuations and line-edge roughness. IEEE Trans. VLSI Syst. 19(6), 987\u2013996 (2011)","journal-title":"IEEE Trans. VLSI Syst."},{"key":"12_CR33","unstructured":"Nangate 45nm Open Cell Library. http:\/\/www.nangate.com . Accessed 1 May, 2016"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Rioul, O., Sol\u00e9, P., Guilley, S., Danger, J.-L.: On the Entropy of Physically Unclonable Functions. In: IEEE Int\u2019l Symposium on Information Theory (ISIT), Barcelona, Spain, July 2016","DOI":"10.1109\/ISIT.2016.7541835"},{"issue":"6","key":"12_CR35","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1214\/aos\/1176344370","volume":"6","author":"AS Hedayat","year":"1978","unstructured":"Hedayat, A.S., Wallis, W.D.: Hadamard matrices, their applications. Ann. Statist. 6(6), 1184\u20131238 (1978). http:\/\/dx.doi.org\/10.1214\/aos\/1176344370","journal-title":"Ann. Statist."},{"key":"12_CR36","unstructured":"JEDEC. JEP122G : Failure mechanisms and models for semiconductor devices. http:\/\/www.jedec.org\/standards-documents\/docs\/jep-122e . October 2011"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49445-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T14:12:51Z","timestamp":1568556771000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49445-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319494449","9783319494456"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49445-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}