{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:26:28Z","timestamp":1743031588272,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319557137"},{"type":"electronic","value":"9783319557144"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-55714-4_9","type":"book-chapter","created":{"date-parts":[[2017,3,7]],"date-time":"2017-03-07T04:22:08Z","timestamp":1488860528000},"page":"128-148","source":"Crossref","is-referenced-by-count":3,"title":["Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol"],"prefix":"10.1007","author":[{"given":"Gerben","family":"Geltink","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,8]]},"reference":[{"key":"9_CR1","unstructured":"Avnet Inc.: ZedBoard (2016). http:\/\/zedboard.org\/product\/zedboard . Accessed 19 August 2016"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1007\/978-3-662-48324-4_28","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"A Aysu","year":"2015","unstructured":"Aysu, A., Gulcan, E., Moriyama, D., Schaumont, P., Yung, M.: End-to-end design of a puf-based privacy preserving authentication protocol. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 556\u2013576. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-48324-4_28"},{"key":"9_CR3","unstructured":"Bernstein, D., et al.: CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness (2016). http:\/\/competitions.cr.yp.to\/caesar.html"},{"key":"9_CR4","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Asche, G., Van Keer, R.: CAESAR submission: Ketje v1. http:\/\/ketje.noekeon.org\/Ketje-1.1.pdf"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-85053-3_12","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"C B\u00f6sch","year":"2008","unstructured":"B\u00f6sch, C., Guajardo, J., Sadeghi, A.-R., Shokrollahi, J., Tuyls, P.: Efficient helper data key extractor on FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 181\u2013197. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-85053-3_12"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Delvaux, J., Peeters, R., Gu, D., Verbauwhede, I.: A survey on lightweight entity authentication with strong pufs. ACM Comput. Surv. 48(2), 26:1\u201326:42. http:\/\/doi.acm.org\/10.1145\/2818186","DOI":"10.1145\/2818186"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523\u2013540. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24676-3_31"},{"key":"9_CR8","doi-asserted-by":"publisher","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: Physical unclonable functions and public-key crypto for FPGA IP protection. In: 2007 International Conference on Field Programmable Logic and Applications, pp. 189\u2013195, August 2007","DOI":"10.1109\/FPL.2007.4380646"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1007\/978-3-642-32946-3_27","volume-title":"Financial Cryptography and Data Security","author":"A Herrewege","year":"2012","unstructured":"Herrewege, A., Katzenbeisser, S., Maes, R., Peeters, R., Sadeghi, A.-R., Verbauwhede, I., Wachsmann, C.: Reverse fuzzy extractors: enabling lightweight mutual authentication for PUF-enabled RFIDs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 374\u2013389. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32946-3_27"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-46513-8_2","volume-title":"Selected Areas in Cryptography","author":"J Kelsey","year":"2000","unstructured":"Kelsey, J., Schneier, B., Ferguson, N.: Yarrow-160: notes on the design and analysis of the yarrow cryptographic pseudorandom number generator. In: Heys, H., Adams, C. (eds.) SAC 1999. LNCS, vol. 1758, pp. 13\u201333. Springer, Heidelberg (2000). doi: 10.1007\/3-540-46513-8_2"},{"key":"9_CR11","doi-asserted-by":"publisher","unstructured":"Lee, M.Z., Dunn, A.M., Waters, B., Witchel, E., Katz, J.: Anon-pass: practical anonymous subscriptions. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 319\u2013333, May 2013","DOI":"10.1109\/SP.2013.29"},{"key":"9_CR12","doi-asserted-by":"publisher","unstructured":"Machida, T., Yamamoto, D., Iwamoto, M., Sakiyama, K.: A New Arbiter PUF for Enhancing Unpredictability on FPGA. Sci. World J. http:\/\/dx.doi.org\/10.1155\/2015\/864812","DOI":"10.1155\/2015\/864812"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Maes, R.: Physically unclonable functions: Constructions, properties and applications. Ph.D. thesis, Dissertation, University of KU Leuven (2012)","DOI":"10.1007\/978-3-642-41395-7_2"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-642-33027-8_18","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"R Maes","year":"2012","unstructured":"Maes, R., Herrewege, A., Verbauwhede, I.: PUFKY: a fully functional PUF-based cryptographic key generator. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 302\u2013319. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33027-8_18"},{"key":"9_CR15","unstructured":"Moriyama, D., Matsuo, S., Yung, M.: PUF-Based RFID Authentication Secure and Private under Memory Leakage. Cryptology ePrint Archive, Report 2013\/712 (2013). http:\/\/eprint.iacr.org\/2013\/712.pdf"},{"key":"9_CR16","doi-asserted-by":"publisher","unstructured":"Rogaway, P.: Authenticated-encryption with associated-data. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, NY, USA, pp. 98\u2013107 (2002). http:\/\/doi.acm.org\/10.1145\/586110.586125","DOI":"10.1145\/586110.586125"},{"key":"9_CR17","unstructured":"Xilinx Inc.: Zynq-7000 All Programmable SoC Overview, Product Specification DS190 (v1.9). http:\/\/www.xilinx.com\/support\/documentation\/data_sheets\/ds190-Zynq-7000-Overview.pdf . Accessed 19 August 2016"}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-55714-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T07:15:22Z","timestamp":1568877322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-55714-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319557137","9783319557144"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-55714-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}