{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:06:17Z","timestamp":1742940377831,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540899938"},{"type":"electronic","value":"9783540899945"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89994-5_13","type":"book-chapter","created":{"date-parts":[[2008,12,8]],"date-time":"2008-12-08T00:41:38Z","timestamp":1228696898000},"page":"157-178","source":"Crossref","is-referenced-by-count":2,"title":["Protection of Sensitive Security Parameters in Integrated Circuits"],"prefix":"10.1007","author":[{"given":"Dejan E.","family":"Lazich","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Micaela","family":"Wuensche","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"FIPS PUB 140-2, Security Requirements for Cryptographic Modules, National Institute of Standards and Technology (2002), \n                    \n                      http:\/\/csrc.nist.gov\/groups\/STM\/index.html"},{"key":"13_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28428-1","volume-title":"Embedded Security in Cars","author":"K. Lemke","year":"2006","unstructured":"Lemke, K.: Embedded Security: Physical Protection against Tampering Attacks. In: Lemke, K., Paar, C., Wolf, M. (eds.) Embedded Security in Cars. Springer, Heidelberg (2006)"},{"key":"13_CR3","unstructured":"Joint Interpretation Library CC\/ITSEC: Integrated Circuit Hardware Evaluation Methodology - Vulnerability Assessment, Version 1.3 (2000), \n                    \n                      http:\/\/www.bsi.de\/zertifiz\/itkrit\/itsec.htm"},{"key":"13_CR4","unstructured":"Smith, S.W., Weingart, S.: Building a High-Performance, Programmable Secure Coprocessor, Technical Report, IBM T.J. Watson Research Center, P.O Box. Yorktown Heigts NY 10598, USA (Revision of October 16, 1998), \n                    \n                      http:\/\/www.research.ibm.com\/secure_systems_department\/projects\/scop\/papers\/arch.pdf"},{"key":"13_CR5","volume-title":"Principles and Practice of Information Theory","author":"R. Blahut","year":"1987","unstructured":"Blahut, R.: Principles and Practice of Information Theory. Addison-Wesley, Reading (1987)"},{"key":"13_CR6","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1002\/j.1538-7305.1952.tb01393.x","volume":"31","author":"E.N. Gilbert","year":"1952","unstructured":"Gilbert, E.N.: A Comparison of Signalling Alphabets. Bell System Technical Journal\u00a031, 504\u2013522 (1952)","journal-title":"Bell System Technical Journal"},{"key":"13_CR8","unstructured":"Varshamov, R.: Estimate of Number of Signals in Error Correcting Codes, Tech. Rep. 117, Dokl. Akad. Nauk, SSSR (1957)"},{"key":"13_CR9","unstructured":"Beth, Th., Lazic, D.E., Senk, V.: The Generalised Gilbert-Varshamov Distance of a Code Family and its Influence on the Family\u2019s Error Exponent. In: Proceedings of the International Symposium on Information Theory & Its Applications 1994, Sydney, Australia, vol.\u00a01, pp. 965\u2013970 (1994)"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/3-540-60114-7_9","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"T. Beth","year":"1995","unstructured":"Beth, Th., Kalouti, H., Lazic, D.E.: Which Families of Long Binary Linear Codes Have a Binomial Weight Distribution? In: Giusti, M., Cohen, G., Mora, T. (eds.) AAECC 1995. LNCS, vol.\u00a0948, pp. 120\u2013130. Springer, Heidelberg (1995)"},{"issue":"9-10","key":"13_CR11","first-page":"762","volume":"50","author":"T.. Beth","year":"1995","unstructured":"Beth, T., Lazic, D.E., Kalouti, H.: On the Relation Between Distance Distributions of Linear Block Codes and the Binomial Distribution. Annales des Telecommunications, special issue on Channel Coding\u00a050(9-10), 762\u2013778 (1995)","journal-title":"Annales des Telecommunications, special issue on Channel Coding"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon Physical Random Functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (2002)","DOI":"10.1145\/586110.586132"},{"key":"13_CR13","volume-title":"Concurrency and Computation: Practice and Experience","author":"B. Gassend","year":"2003","unstructured":"Gassend, B., Clarke, D., Lim, D., van Dijk, M., Devadas, S.: Identification and Authentication of Integrated Circuits. In: Concurrency and Computation: Practice and Experience. Wiley, Chichester (2003)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A Technique to build a Secret Key in Integrated Circuits for Identification and Authentication Applications. In: 2004 Symposium on VLSI circuits, pp. 176\u2013179 (2004)","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled Physical Random Functions. In: 18th Annual Computer Security Applications Conference (ACSAC 2002), p. 149 (2002)","DOI":"10.1109\/CSAC.2002.1176287"},{"key":"13_CR16","unstructured":"Gassend, B.: Physical Random Functions, Master\u2019s Thesis, Massachusetts Institute of Technology (2003)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Delay-Based Circuit Authentication and Applications. In: Proceedings of the 2003 ACM symposium on Applied computing, Melbourne, Florida, pp. 294\u2013301 (2003)","DOI":"10.1145\/952532.952593"},{"key":"13_CR18","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D. Lim","year":"2005","unstructured":"Lim, D.: Extracting Secret Keys from Integrated Circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems\u00a013, 1200\u20131205 (2005)","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"13_CR19","unstructured":"Lim, D.: Extracting Secret Keys from Integrated Circuits, Master\u2019s Thesis, Massachusetts Institute of Technology (2004)"},{"key":"13_CR20","unstructured":"Vrijaldenhoven, S.: Acoustical Physical Uncloneable Functions, Master\u2019s Thesis, Technische Universiteit Eindhoven (2004)"},{"issue":"6","key":"13_CR21","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1109\/MDT.2007.179","volume":"24","author":"G.E. Suh","year":"2007","unstructured":"Suh, G.E., O\u2019Donnell, C.W., Devadas, S.: AEGIS: A Single-Chip Secure Processor. IEEE Design&Test of Computers\u00a024(6), 570\u2013580 (2007)","journal-title":"IEEE Design&Test of Computers"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Suh, G.E., O\u2019Donnell, C.W., Sachdev, I., Devadas, S.: Design and Implementation of the AEGIS Single-Chip Secure Processor using Physical Random Functions. In: Proceedings of the 32nd International Symposium on Computer Architecture (ISCA 2005), pp. 25\u201336 (2005)","DOI":"10.1109\/ISCA.2005.22"},{"key":"13_CR23","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R.S. Pappu","year":"2002","unstructured":"Pappu, R.S., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-Way Functions. Science\u00a0297, 2026\u20132030 (2002)","journal-title":"Science"},{"key":"13_CR24","unstructured":"Pappu, R.S.: Physical One-Way Functions. RSA Laboratories Cryptobytes\u00a06(2) (Summer 2003)"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Nassif, S.R.: Modeling and Forecasting of Manufacturing Variations. In: 5th International Workshop on Statistical Metrology, pp. 2\u201310 (2000)","DOI":"10.1109\/IWSTM.2000.869299"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Skoric, B., Maubach, S., Kevenaar, T., Tuyls, P.: Information-Theoretic Analysis of Capacitive Physical Unclonable Functions. Journal of Applied Physics\u00a0100(2) (2006)","DOI":"10.1063\/1.2209532"},{"key":"13_CR27","unstructured":"Lofstrom, K.: System for Providing an Integrated Circuit with a unique Identification, US Patent Publication, Pat.No. 6,161,213 (2000)"},{"key":"13_CR28","unstructured":"Kahlmann, J.A.H.M., Akkermans, A.H.M.: Method for Protecting Information Carrier Comprising an Integrated Circuit, US Patent Application Publication, PUB No. US2007\/0038871 A1 (2007)"},{"key":"13_CR29","unstructured":"Devadas, S., Gassend, B.: Reliable Generation of a Device-Specific Value, US Patent Application Publication, PUB No. US2006\/0271793 A1 (2006)"},{"key":"13_CR30","volume-title":"Reed-Solomom Codes and Their Applications","author":"S. Wicker","year":"1994","unstructured":"Wicker, S., Bhargava, V.: Reed-Solomom Codes and Their Applications. IEEE Press, Los Alamitos (1994)"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Bossert, M.: Kanalcodierung, Teubner Verlag Stuttgart (1998) ISBN 3519161435","DOI":"10.1007\/978-3-322-90916-9"},{"key":"13_CR32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546907","volume-title":"Signal Design for Good Correlation for Wireless Communication, Cryptography and Radar","author":"S.W. Golomb","year":"2005","unstructured":"Golomb, S.W., Gong, G.: Signal Design for Good Correlation for Wireless Communication, Cryptography and Radar. Cambridge University Press, Cambridge (2005)"},{"key":"13_CR33","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: A Mathematical Theory of Communication. Bell System Technical Journal\u00a027, 379\u2013423, 623\u2013656 (1948)","journal-title":"Bell System Technical Journal"}],"container-title":["Lecture Notes in Computer Science","Mathematical Methods in Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89994-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,4]],"date-time":"2019-03-04T02:58:30Z","timestamp":1551668310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89994-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540899938","9783540899945"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89994-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}