{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:59:54Z","timestamp":1742936394809,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540886242"},{"type":"electronic","value":"9783540886259"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88625-9_3","type":"book-chapter","created":{"date-parts":[[2008,10,15]],"date-time":"2008-10-15T04:03:06Z","timestamp":1224043386000},"page":"33-48","source":"Crossref","is-referenced-by-count":13,"title":["Unclonable Lightweight Authentication Scheme"],"prefix":"10.1007","author":[{"given":"Ghaith","family":"Hammouri","sequence":"first","affiliation":[]},{"given":"Erdin\u00e7","family":"\u00d6zt\u00fcrk","sequence":"additional","affiliation":[]},{"given":"Berk","family":"Birand","sequence":"additional","affiliation":[]},{"given":"Berk","family":"Sunar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-540-68914-0_21","volume-title":"Applied Cryptography and Network Security","author":"G. Hammouri","year":"2008","unstructured":"Hammouri, G., Sunar, B.: PUF-HB: A Tamper-Resilient HB based Authentication Protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.\u00a05037, pp. 346\u2013365. Springer, Heidelberg (2008)"},{"issue":"2","key":"3_CR2","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/BF01586000","volume":"71","author":"E.D. Andersen","year":"1995","unstructured":"Andersen, E.D., Andersen, K.D.: Presolving in linear programming. Mathematical Programming\u00a071(2), 221\u2013245 (1995)","journal-title":"Mathematical Programming"},{"key":"3_CR3","volume-title":"Algebraic coding theory","author":"E.R. Berlekamp","year":"1968","unstructured":"Berlekamp, E.R.: Algebraic coding theory. McGraw-Hill, New York (1968)"},{"issue":"3","key":"3_CR4","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"24","author":"E.R. Berlekamp","year":"1978","unstructured":"Berlekamp, E.R., Mceliece, R.J., van Tilborg, H.C.: On the Inherent Intractability of Certain Coding Problems. IEEE Transactions on Information Theory\u00a024(3), 384\u2013386 (1978)","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR5","first-page":"435","volume-title":"Proceedings of STOC 2000","author":"A. Blum","year":"2000","unstructured":"Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. In: Proceedings of STOC 2000, pp. 435\u2013440. ACM, New York (2000)"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Leander, G., Knudsen, L.R., Paar, C., Poschmann, A., Robshaw, M.J., Seurin, Y., Vikkelsoe, C.: PRESENT - An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"3_CR7","first-page":"28","volume-title":"Proceedings of SECPERU 2006","author":"J. Bringer","year":"2006","unstructured":"Bringer, J., Chabanne, H., Dottax, E.: HB\u2009+\u2009+\u2009: a Lightweight Authentication Protocol Secure against Some Attacks. In: Proceedings of SECPERU 2006, Washington, DC, USA, pp. 28\u201333. IEEE Computer Society, Los Alamitos (2006)"},{"key":"3_CR8","unstructured":"Duc, D., Kim, K.: Securing HB+ Against GRS Man-in-the-Middle Attack. In: Institute of Electronics, Information and Communication Engineers, Symposium on Cryptography and Information Security, January, pp. 23\u201326 (2007)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Ozturk, E., Hammouri, G., Sunar, B.: Physical Unclonable Function with Tristate Buffers. In: Proceedings of ISCAS 2008 (2008)","DOI":"10.1109\/ISCAS.2008.4542137"},{"issue":"6","key":"3_CR10","first-page":"522","volume":"24","author":"T. Eisenbarth","year":"2007","unstructured":"Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A Survey of Lightweight Cryptography Implementations. IEEE Design & Test of Computers \u2013 Special Issue on Secure ICs for Secure Embedded Computing\u00a024(6), 522\u2013533 (2007)","journal-title":"IEEE Design & Test of Computers \u2013 Special Issue on Secure ICs for Secure Embedded Computing"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156. Springer, Heidelberg (2004)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Fossorier, M., Mihaljevic, M., Imai, H., Cui, Y., Matsuura, K.: A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication. In: Proc. of INDOCRYPT, vol.\u00a06, pp. 48\u201362","DOI":"10.1007\/11941378_5"},{"key":"3_CR13","first-page":"148","volume-title":"Proceedings of CCS 2002","author":"B. Gassend","year":"2002","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of CCS 2002, pp. 148\u2013160. ACM, New York (2002)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Delay-based Circuit Authentication and Applications. In: Proceedings of the 2003 ACM Symposium on Applied Computing, pp. 294\u2013301 (2003)","DOI":"10.1145\/952589.952593"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-540-78967-3_21","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"H. Gilbert","year":"2008","unstructured":"Gilbert, H., Robshaw, M., Seurin, Y.: HB#: Increasing the Security and Efficiency of HB\u2009+\u2009. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 361\u2013378. Springer, Heidelberg (2008)"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1049\/el:20052622","volume":"41","author":"H. Gilbert","year":"2005","unstructured":"Gilbert, H., Robshaw, M., Sibert, H.: An Active Attack Against HB+ A Provably Secure Lightweight Authentication Protocol. IEE Electronic Letters\u00a041, 1169\u20131170 (2005)","journal-title":"IEE Electronic Letters"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/11894063_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"D. Hong","year":"2006","unstructured":"Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B., Lee, C., Chang, D., Lee, J., Jeong, K., et al.: HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 46\u201359. Springer, Heidelberg (2006)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Ozturk, E., Hammouri, G., Sunar, B.: Towards Robust Low Cost Authentication for Pervasive Devices. In: PERCOM 2008, Hong Kong, March 17-21 (2008)","DOI":"10.1109\/PERCOM.2008.54"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 52\u201366. Springer, Heidelberg (2001)"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"issue":"2","key":"3_CR21","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MC.2007.52","volume":"40","author":"J. Kaps","year":"2007","unstructured":"Kaps, J., Gaubatz, G., Sunar, B.: Cryptography on a Speck of Dust. Computer\u00a040(2), 38\u201344 (2007)","journal-title":"Computer"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/11807964_38","volume-title":"Emerging Directions in Embedded and Ubiquitous Computing","author":"J.-P. Kaps","year":"2006","unstructured":"Kaps, J.-P., Sunar, B.: Energy Comparison of AES and SHA-1 for Ubiquitous Computing. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D.Y., Jeong, Y.-S., Xu, C.-Z. (eds.) EUC Workshops 2006. LNCS, vol.\u00a04097, pp. 372\u2013381. Springer, Heidelberg (2006)"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/11761679_6","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"J. Katz","year":"2006","unstructured":"Katz, J., Shin, J.S.: Parallel and Concurrent Security of the HB and HB $^{\\mbox{+}}$ Protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 73\u201387. Springer, Heidelberg (2006)"},{"key":"3_CR24","first-page":"392","volume-title":"Proceedings of STOC 1993","author":"M. Kearns","year":"1993","unstructured":"Kearns, M.: Efficient Noise-Tolerant Learning from Statistical Queries. In: Proceedings of STOC 1993, pp. 392\u2013401. ACM Press, New York (1993)"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"3_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/11889700_19","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"K.J. Kulikowski","year":"2006","unstructured":"Kulikowski, K.J., Karpovsky, M.G., Taubin, A.: Dpa on faulty cryptographic hardware and countermeasures. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 211\u2013222. Springer, Heidelberg (2006)"},{"key":"3_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-540-74619-5_13","volume-title":"Fast Software Encryption","author":"G. Leander","year":"2007","unstructured":"Leander, G., Paar, C., Poschmann, A., Schramm, K.: New Lightweight DES Variants. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, p. 196. Springer, Heidelberg (2007)"},{"key":"3_CR29","unstructured":"Lee, J.W., Daihyun, L., Gassend, B., Samd, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium of VLSI Circuits, pp. 176\u2013179 (2004)"},{"key":"3_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/11832072_24","volume-title":"Security and Cryptography for Networks","author":"E. Levieil","year":"2006","unstructured":"Levieil, E., Fouque, P.: An Improved LPN Algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol.\u00a04116, p. 348. Springer, Heidelberg (2006)"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Lim, C., Korkishko, T.: mCrypton-A Lightweight Block Cipher for Security of Low-cost RFID Tags and Sensors. In: WISA, vol.\u00a05, pp. 243\u2013258","DOI":"10.1007\/11604938_19"},{"issue":"10","key":"3_CR32","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D. Lim","year":"2005","unstructured":"Lim, D., Lee, J.W., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst.\u00a013(10), 1200\u20131205 (2005)","journal-title":"IEEE Trans. VLSI Syst."},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V.: The parity problem in the presence of noise, decoding random linear codes, and the subsetsum problem. In: APPROXRANDOM (2005)","DOI":"10.1007\/11538462_32"},{"issue":"9","key":"3_CR34","doi-asserted-by":"publisher","first-page":"2262","DOI":"10.1016\/j.comnet.2007.01.011","volume":"51","author":"J. Munilla","year":"2007","unstructured":"Munilla, J., Peinado, A.: HB-MP: A further step in the HB-family of lightweight authentication protocols. Comput. Networks\u00a051(9), 2262\u20132267 (2007)","journal-title":"Comput. Networks"},{"key":"3_CR35","unstructured":"O\u2019Donnell, C.W., Suh, G.E., Devadas, S.: Puf-based random number generation. Number 481 (November 2004)"},{"issue":"7","key":"3_CR36","first-page":"652","volume":"4","author":"R. Posch","year":"1998","unstructured":"Posch, R.: Protecting Devices by Active Coating. Journal of Universal Computer Science\u00a04(7), 652\u2013668 (1998)","journal-title":"Journal of Universal Computer Science"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"Poschmann, A., Leander, G., Schramm, K., Paar, C.: New Ligh-Weight Crypto Algorithms for RFID. In: Proceedings of ISCAS 2007, pp. 1843\u20131846 (2007)","DOI":"10.1109\/ISCAS.2007.378273"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Regazzoni, F., Badel, S., Eisenbarth, T., Grobschadl, J., Poschmann, A., Toprak, Z., Macchetti, M., Pozzi, L., Paar, C., Leblebici, Y., et al.: A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies. In: IC-SAMOS 2007, pp. 209\u2013214 (2007)","DOI":"10.1109\/ICSAMOS.2007.4285753"},{"key":"3_CR39","volume-title":"Interior Point Methods for Linear Optimization","author":"C. Roos","year":"2005","unstructured":"Roos, C., Terlaky, T., Vial, J.-P.: Interior Point Methods for Linear Optimization, 2nd edn. Springer, Heidelberg (2005)","edition":"2"},{"key":"3_CR40","unstructured":"Skoric, B., Maubach, S., Kevenaar, T., Tuyls, P.: Information-theoretic Analysis of Coating PUFs. Cryptology ePrint Archive, Report 2006\/101 (2006)"},{"key":"3_CR41","doi-asserted-by":"crossref","unstructured":"Standaert, F., Piret, G., Gershenfeld, N., Quisquater, J.: SEA: A Scalable Encryption Algorithm for Small Embedded Applications. In: Workshop on RFID and Lightweight Crypto, Graz, Austria (2005)","DOI":"10.1007\/11733447_16"},{"key":"3_CR42","unstructured":"Tiri, K., Akmal, M., Verbauwhede, I.: A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards. In: Proceedings of ESSCIRC 2002, pp. 403\u2013406 (2002)"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Toprak, Z., Leblebici, Y.: Low-power current mode logic for improved DPA-resistance in embedded systems. In: ISCAS 2005, pp. 1059\u20131062 (2005)","DOI":"10.1109\/ISCAS.2005.1464774"},{"key":"3_CR44","series-title":"Philips Research Book Series","volume-title":"Secret Key Generation from Classical Physics: Physical Uncloneable Functions","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Skoric, B.: Secret Key Generation from Classical Physics: Physical Uncloneable Functions. Philips Research Book Series. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88625-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T19:20:36Z","timestamp":1738437636000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88625-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540886242","9783540886259"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88625-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}