{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:28:06Z","timestamp":1725906486931},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319646466"},{"type":"electronic","value":"9783319646473"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64647-3_15","type":"book-chapter","created":{"date-parts":[[2017,7,28]],"date-time":"2017-07-28T15:33:27Z","timestamp":1501256007000},"page":"248-263","source":"Crossref","is-referenced-by-count":8,"title":["Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors"],"prefix":"10.1007","author":[{"given":"Manami","family":"Suzuki","sequence":"first","affiliation":[]},{"given":"Rei","family":"Ueno","sequence":"additional","affiliation":[]},{"given":"Naofumi","family":"Homma","sequence":"additional","affiliation":[]},{"given":"Takafumi","family":"Aoki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,29]]},"reference":[{"issue":"1","key":"15_CR1","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Reyzin, M., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63\u201380. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74735-2_5"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Koeberl, P., Li, J., Rajan, A., Wu, W.: Entropy loss in puf-based key generation schemes : the repetition code pitfall, pp. 44\u201349 (2014)","DOI":"10.1109\/HST.2014.6855566"},{"key":"15_CR4","unstructured":"Lily, C.: Recommendation for key derivation using pseudorandom functions(revised) (2009)"},{"key":"15_CR5","unstructured":"Lily, C.: Recommendation for key derivation through extraction-then-expansion (2011)"},{"issue":"10","key":"15_CR6","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D Lim","year":"2005","unstructured":"Lim, D., Lee, J., Gassend, B., Suh, G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integer VLSI Syst. 13(10), 1200\u20131205 (2005)","journal-title":"IEEE Trans. Very Large Scale Integer VLSI Syst."},{"key":"15_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-41395-7","volume-title":"Physically Unclonable Functions","author":"R Maes","year":"2013","unstructured":"Maes, R.: Physically Unclonable Functions. Springer, Heidelberg (2013)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/978-3-662-48324-4_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"R Maes","year":"2015","unstructured":"Maes, R., Leest, V., Sluis, E., Willems, F.: Secure key generation from biased PUFs. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 517\u2013534. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-48324-4_26"},{"key":"15_CR9","first-page":"36","volume":"12","author":"J Neumann von","year":"1951","unstructured":"von Neumann, J.: Various techniques used in connection with random digits. Appl. Math. Ser. 12, 36\u201338 (1951). National Bureau of Standards, USA","journal-title":"Appl. Math. Ser."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Su, Y., Holleman, J., Otis, B.: A 1.6pj\/bit 96% stable chip-id generating circuit using process variations. In: IEEE International Solid-State Circuits Conference (ISSCC2007), pp. 406\u2013611 (2007)","DOI":"10.1109\/ISSCC.2007.373466"},{"issue":"1","key":"15_CR11","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/JSSC.2007.910961","volume":"43","author":"Y Su","year":"2008","unstructured":"Su, Y., Holleman, J., Otis, B.: A digital 1.6pj\/bit chip identification circuit using process variations. IEEE J. Solid-State Circ. 43(1), 69\u201377 (2008)","journal-title":"IEEE J. Solid-State Circ."},{"issue":"4","key":"15_CR12","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/s13389-012-0044-0","volume":"3","author":"D Yamamoto","year":"2013","unstructured":"Yamamoto, D., Sakiyama, K., Iwamoto, M., Ohta, K., Takenaka, M., Itoh, K.: Variety enhancement of PUF responce using the locations of random outputting RS latches. Crypt. Eng. 3(4), 197\u2013211 (2013)","journal-title":"Crypt. Eng."}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64647-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T19:35:57Z","timestamp":1569958557000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64647-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319646466","9783319646473"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64647-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}