{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T21:51:50Z","timestamp":1761947510532,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540889601"},{"type":"electronic","value":"9783540889618"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88961-8_8","type":"book-chapter","created":{"date-parts":[[2008,10,15]],"date-time":"2008-10-15T01:22:43Z","timestamp":1224033763000},"page":"102-117","source":"Crossref","is-referenced-by-count":49,"title":["Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach"],"prefix":"10.1007","author":[{"given":"Yousra","family":"Alkabani","sequence":"first","affiliation":[]},{"given":"Farinaz","family":"Koushanfar","sequence":"additional","affiliation":[]},{"given":"Negar","family":"Kiyavash","sequence":"additional","affiliation":[]},{"given":"Miodrag","family":"Potkonjak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Chang, H., Sapatnekar, S.: Full-chip analysis of leakage power under process variations, including spatial correlations. In: DAC, pp. 523\u2013528 (2005)","DOI":"10.1145\/1065579.1065716"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/3-540-39799-X_2","volume-title":"Advances in Cryptology","author":"D. Coppersmith","year":"1986","unstructured":"Coppersmith, D.: Another birthday attack. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 14\u201317. Springer, Heidelberg (1986)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Friedberg, P., et al.: Modeling within-die spatial correlation effects for process-design co-optimization. In: ISQED, pp. 516\u2013521 (2005)","DOI":"10.1109\/ISQED.2005.82"},{"key":"8_CR4","first-page":"1077","volume-title":"Concurrency and Computation: Practice and Experience","author":"B. Gassend","year":"2004","unstructured":"Gassend, B., et al.: Identification and authentication of integrated circuits. In: Concurrency and Computation: Practice and Experience, vol.\u00a016, pp. 1077\u20131098. John Wiley & Sons, Chichester (2004)"},{"key":"8_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21606-5","volume-title":"The Elements of Statistical Learning","author":"T. Hastie","year":"2001","unstructured":"Hastie, T., et al.: The Elements of Statistical Learning. Springer, Heidelberg (2001)"},{"issue":"4\/5","key":"8_CR6","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1147\/rd.504.0433","volume":"50","author":"K. Bernstein","year":"2006","unstructured":"Bernstein, K., et al.: High-performance CMOS variability in the 65-nm regime and beyond. IBM Journal of Research and Development\u00a050(4\/5), 433\u2013450 (2006)","journal-title":"IBM Journal of Research and Development"},{"issue":"9","key":"8_CR7","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1109\/TCAD.2003.816208","volume":"22","author":"D. Kirovski","year":"2003","unstructured":"Kirovski, D., Potkonjak, M.: Local watermarks: methodology and application to behavioral synthesis. IEEE Trans. CAD\u00a022(9), 1277\u20131283 (2003)","journal-title":"IEEE Trans. CAD"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Koushanfar, F., et al.: Intellectual property metering. In: IHW, pp. 81\u201395 (2001)","DOI":"10.1007\/3-540-45496-9_7"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Lach, J., et al.: Fingerprinting digital circuits on programmable hardware. In: IHW, pp. 16\u201332 (1998)","DOI":"10.1007\/3-540-49380-8_2"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Lee, J., et al.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium of VLSI, pp. 176\u2013179 (2004)","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Lofstrom, K., et al.: IC identification circuits using device mismatch. In: ISSCC, pp. 372\u2013373 (2000)","DOI":"10.1109\/ISSCC.2000.839821"},{"issue":"6","key":"8_CR12","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.1109\/TED.2002.808526","volume":"50","author":"S. Maeda","year":"2003","unstructured":"Maeda, S., et al.: An artificial fingerprint device (AFD): a study of identification number applications utilizing characteristics variation of polycrystalline silicon TFTs. IEEE Trans. Electron. Devices\u00a050(6), 1451\u20131458 (2003)","journal-title":"IEEE Trans. Electron. Devices"},{"issue":"4","key":"8_CR13","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1080\/00031305.1992.10475901","volume":"46","author":"T. Nunnukhoven","year":"1992","unstructured":"Nunnukhoven, T.: A birthday problem solution for nonuniform birthday frequencies. The American Statistician\u00a046(4), 270\u2013274 (1992)","journal-title":"The American Statistician"},{"issue":"1","key":"8_CR14","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/MC.2006.31","volume":"39","author":"N. Vijaykrishnan","year":"2006","unstructured":"Vijaykrishnan, N., Xie, Y.: Reliability concerns in embedded system designs. IEEE Computer\u00a039(1), 118\u2013120 (2006)","journal-title":"IEEE Computer"},{"issue":"9","key":"8_CR15","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1109\/43.945306","volume":"20","author":"A. Oliveira","year":"2001","unstructured":"Oliveira, A.: Techniques for the creation of digital watermarks in sequential circuit designs. IEEE Trans. on CAD\u00a020(9), 1101\u20131117 (2001)","journal-title":"IEEE Trans. on CAD"},{"key":"8_CR16","volume-title":"Intellectual Property Protection in VLSI Design","author":"G. Qu","year":"2003","unstructured":"Qu, G., Potkonjak, M.: Intellectual Property Protection in VLSI Design. Kluwer Academic Publishers, Dordrecht (2003)"},{"key":"8_CR17","series-title":"Series on Integrated Circuits and Systems","volume-title":"Statistical Analysis and Optimization for VLSI: Timing and Power","author":"A. Srivastava","year":"2005","unstructured":"Srivastava, A., et al.: Statistical Analysis and Optimization for VLSI: Timing and Power. Series on Integrated Circuits and Systems. Springer, Heidelberg (2005)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Su, Y., et al.: A 1.6 J\/bit stable chip ID generating circuit using process variations. In: ISSCC, 406\u2013407 (2007)","DOI":"10.1109\/ISSCC.2007.373466"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Suh, G., et al.: Design and implementation of the aegis single-chip secure processor using physical random functions. In: ISCA, pp. 25\u201336 (2005)","DOI":"10.1109\/ISCA.2005.22"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Thompson, A., Layzell, P.: Evolution of robustness in an electronics design. In: ICES, pp. 218\u2013228 (2000)","DOI":"10.1007\/3-540-46406-9_22"},{"issue":"3","key":"8_CR21","first-page":"434","volume":"35","author":"I. Torunoglu","year":"2000","unstructured":"Torunoglu, I., Charbon, E.: Watermarking-based copyright protection of sequential functions. JSSC\u00a035(3), 434\u2013440 (2000)","journal-title":"JSSC"},{"issue":"2","key":"8_CR22","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1109\/TVLSI.2005.863747","volume":"14","author":"L. Yuan","year":"2006","unstructured":"Yuan, L., Qu, G.: A combined gate replacement and input vector control approach for leakage current reduction. IEEE Trans. on VLSI\u00a014(2), 173\u2013182 (2006)","journal-title":"IEEE Trans. on VLSI"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88961-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T19:16:02Z","timestamp":1738437362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88961-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540889601","9783540889618"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88961-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}