{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:08:44Z","timestamp":1750392524090,"version":"3.41.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_37","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T15:29:56Z","timestamp":1497367796000},"page":"675-693","source":"Crossref","is-referenced-by-count":2,"title":["FROPUF: How to Extract More Entropy from\u00a0Two Ring Oscillators in FPGA-Based PUFs"],"prefix":"10.1007","author":[{"given":"Qinglong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zongbin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Cunqing","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Changting","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lingchen","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Ruhrmair, U., Holcomb, D.E.: PUFs at a glance. In: Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 1\u20136 (2014)","DOI":"10.7873\/DATE2014.360"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., Van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 148\u2013160 (2002)","DOI":"10.1145\/586110.586132"},{"key":"37_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-33027-8_17","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"S Katzenbeisser","year":"2012","unstructured":"Katzenbeisser, S., Kocaba\u015f, \u00dc., Ro\u017ei\u0107, V., Sadeghi, A.-R., Verbauwhede, I., Wachsmann, C.: PUFs: myth, fact or busted? a security evaluation of physically unclonable functions\u00a0(PUFs) cast in silicon. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 283\u2013301. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33027-8_17"},{"key":"37_CR4","volume-title":"Physical One-Way Functions","author":"P Ravikanth","year":"2002","unstructured":"Ravikanth, P., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-Way Functions, vol. 297. American Association for the Advancement of Science, Washington, DC (2002). pp. 2026\u20132030"},{"key":"37_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-642-33027-8_18","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"R Maes","year":"2012","unstructured":"Maes, R., Van Herrewege, A., Verbauwhede, I.: PUFKY: a fully functional PUF-based cryptographic key generator. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 302\u2013319. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33027-8_18"},{"key":"37_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63\u201380. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74735-2_5"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Roy, J.A., Koushanfar, F., Markov, I.L.: EPIC: Ending piracy of integrated circuits. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 1069\u20131074 (2008)","DOI":"10.1145\/1403375.1403631"},{"key":"37_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-642-32298-3_18","volume-title":"Trusted Systems","author":"P Koeberl","year":"2012","unstructured":"Koeberl, P., Li, J., Maes, R., Rajan, A., Vishik, C., W\u00f3jcik, M.: Evaluation of a PUF device authentication scheme on a discrete 0.13 um SRAM. In: Chen, L., Yung, M., Zhu, L. (eds.) INTRUST 2011. LNCS, vol. 7222, pp. 271\u2013288. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32298-3_18"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., Khandelwal, V.: Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications. In: 2008 IEEE International Conference on RFID, pp. 58\u201364 (2008)","DOI":"10.1109\/RFID.2008.4519377"},{"key":"37_CR10","series-title":"Data-Centric Systems and Applications","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-540-69861-6_10","volume-title":"Security, Privacy, and Trust in Modern Data Management","author":"P Tuyls","year":"2007","unstructured":"Tuyls, P., \u0160kori\u0107, B.: Strong authentication with physical unclonable functions. In: Petkovi\u0107, M., Jonker, W. (eds.) Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications, pp. 133\u2013148. Springer, Heidelberg (2007)"},{"key":"37_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-662-44709-3_28","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"DE Holcomb","year":"2014","unstructured":"Holcomb, D.E., Fu, K.: Bitline PUF: building native challenge-response PUF capability into any SRAM. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 510\u2013526. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-44709-3_28"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G-J., Tuyls, P.: Extended abstract: the butterfly PUF protecting IP on every FPGA. In: IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, pp. 67\u201370 (2008)","DOI":"10.1109\/HST.2008.4559053"},{"key":"37_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/978-3-642-15031-9_25","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"D Suzuki","year":"2010","unstructured":"Suzuki, D., Shimizu, K.: The glitch PUF: a new delay-PUF architecture exploiting glitch shapes. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 366\u2013382. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15031-9_25"},{"key":"37_CR14","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic PUFs from flip-flops on reconfigurable devices. In: 3rd Benelux Workshop on Information and System Security (WISSec 2008) (2008)"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th Annual Design Automation Conference, pp. 9\u201314 (2007)","DOI":"10.1145\/1278480.1278484"},{"key":"37_CR16","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1007\/s00145-010-9088-4","volume":"2","author":"A Maiti","year":"2011","unstructured":"Maiti, A., Schaumont, P.: Improved ring oscillator PUF: an FPGA-friendly secure primitive. J. Cryptology 2, 375\u2013397 (2011)","journal-title":"J. Cryptology"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Gao, M., Lai, K., Qu, G.: A highly flexible ring oscillator PUF. In: Proceedings of the 51st Annual Design Automation Conference on Design Automation Conference. ACM (2014)","DOI":"10.1145\/2593069.2593072"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Rahman, T., Forte, D., Fahrny, J., Tehranipoor, M.: ARO-PUF: an aging-resistant ring oscillator PUF design. In: Proceedings of the Conference on Design, Automation & Test in Europe (2014)","DOI":"10.7873\/DATE2014.082"},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"Cherkaoui, A., Fischer, V., Aubert, A., Fesquet, L.: Comparison of self-timed ring and inverter ring oscillators as entropy sources in FPGAs. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1325\u20131330. IEEE (2012)","DOI":"10.1109\/DATE.2012.6176697"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Yin, C-E., Qu, G., Zhou, Q.: Design and implementation of a group-based RO PUF. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 416\u2013421. EDA Consortium (2013)","DOI":"10.7873\/DATE.2013.094"},{"key":"37_CR21","doi-asserted-by":"crossref","unstructured":"Dominik, M., Heyszl, J., Heinz, B., Schuster, D., Stumpf, F., Sigl, G.: Localized electromagnetic analysis of RO PUFs. In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 19\u201324. IEEE (2013)","DOI":"10.1109\/HST.2013.6581559"},{"key":"37_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523\u2013540. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24676-3_31"},{"key":"37_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-85053-3_12","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"C B\u00f6sch","year":"2008","unstructured":"B\u00f6sch, C., Guajardo, J., Sadeghi, A.-R., Shokrollahi, J., Tuyls, P.: Efficient helper data key extractor on FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 181\u2013197. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-85053-3_12"},{"key":"37_CR24","doi-asserted-by":"crossref","unstructured":"Habib, B., Kris, G., Kaps, J-P.: FPGA PUF based on programmable LUT delays. In: 2013 Euromicro Conference on Digital System Design (DSD). IEEE (2013)","DOI":"10.1109\/DSD.2013.79"},{"key":"37_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-23951-9_2","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"M Majzoobi","year":"2011","unstructured":"Majzoobi, M., Koushanfar, F., Devadas, S.: FPGA-based true random number generation using circuit metastability with adaptive feedback control. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 17\u201332. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-23951-9_2"},{"key":"37_CR26","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Devadas, S.: FPGA PUF using programmable delay lines. In: 2010 IEEE International Workshop on Information Forensics and Security (WIFS) (2010)","DOI":"10.1109\/WIFS.2010.5711471"},{"key":"37_CR27","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions, pp. 237\u2013249 (2010)","DOI":"10.1145\/1866307.1866335"},{"key":"37_CR28","series-title":"Information Security and Cryptography","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-642-14452-3_1","volume-title":"Towards Hardware-Intrinsic Security","author":"R Maes","year":"2010","unstructured":"Maes, R., Verbauwhede, I.: Physically unclonable functions: a study on the state of the art and future research directions. In: Sadeghi, A.-R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security. Information Security and Cryptography, pp. 3\u201337. Springer, Heidelberg (2010)"},{"key":"37_CR29","doi-asserted-by":"crossref","unstructured":"Wold, K., Tan, C.H.: Analysis and enhancement of random number generator in FPGA based on oscillator rings. In: Proceedings of the 2008 International Conference on Reconfigurable Computing and FPGAs, pp. 385\u2013390. IEEE Computer Society (2008)","DOI":"10.1109\/ReConFig.2008.17"},{"key":"37_CR30","doi-asserted-by":"crossref","unstructured":"Maiti, A., Casarona, J., McHale, L.: A large scale characterization of RO-PUF. In: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 94\u201399. IEEE (2010)","DOI":"10.1109\/HST.2010.5513108"},{"key":"37_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-04138-9_24","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"R Maes","year":"2009","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 332\u2013347. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-04138-9_24"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T14:54:19Z","timestamp":1750344859000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_37","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}