{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:01:26Z","timestamp":1740096086292,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642007293"},{"type":"electronic","value":"9783642007309"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00730-9_15","type":"book-chapter","created":{"date-parts":[[2009,3,17]],"date-time":"2009-03-17T07:22:23Z","timestamp":1237274543000},"page":"235-252","source":"Crossref","is-referenced-by-count":2,"title":["Novel PUF-Based Error Detection Methods in Finite State Machines"],"prefix":"10.1007","author":[{"given":"Ghaith","family":"Hammouri","sequence":"first","affiliation":[]},{"given":"Kahraman","family":"Akdemir","sequence":"additional","affiliation":[]},{"given":"Berk","family":"Sunar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Agmon, S.: The relaxation method for linear inequalities. Canadian J. of Mathematics, 382\u2013392 (1964)","DOI":"10.4153\/CJM-1954-037-2"},{"key":"15_CR2","unstructured":"Anderson, R., Kuhn, M.: Tamper resistance: a cautionary note. In: WOEC 1996: Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce, Berkeley, CA, USA, p. 1. USENIX Association (1996)"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Proceedings of the 5th International Workshop on Security Protocols","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Kuhn, M.G.: Low cost attacks on tamper resistant devices. In: Proceedings of the 5th International Workshop on Security Protocols, London, UK, pp. 125\u2013136. Springer, London (1998)"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H. Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attacks. Proceedings of the IEEE\u00a094, 370\u2013382 (2006)","journal-title":"Proceedings of the IEEE"},{"key":"15_CR5","unstructured":"Berg, M.: Fault tolerant design techniques for asynchronous single event upsets within synchronous finite state machine architectures. In: 7th International Military and Aerospace Programmable Logic Devices (MAPLD) Conference. NASA (September 2004)"},{"issue":"4","key":"15_CR6","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TC.2003.1190590","volume":"52","author":"G. Bertoni","year":"2003","unstructured":"Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Transactions on Computers\u00a052(4), 492\u2013505 (2003)","journal-title":"IEEE Transactions on Computers"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"15_CR9","first-page":"211","volume-title":"Proceedings of the 8th international Symposium on Asynchronus Circuits and Systems","author":"P. Cunningham","year":"2002","unstructured":"Cunningham, P., Anderson, R., Mullins, R., Taylor, G., Moore, S.: Improving Smart Card Security Using Self-Timed Circuits. In: Proceedings of the 8th international Symposium on Asynchronus Circuits and Systems, ASYNC, p. 211. IEEE Computer Society, Washington (2002)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Delay-based Circuit Authentication and Applications. In: Proceedings of the 2003 ACM Symposium on Applied Computing, pp. 294\u2013301 (2003)","DOI":"10.1145\/952532.952593"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/11889700_16","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"G. Gaubatz","year":"2006","unstructured":"Gaubatz, G., Sunar, B., Karpovsky, M.G.: Non-linear residue codes for robust public-key arithmetic. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 173\u2013184. Springer, Heidelberg (2006)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Gaubatz, G., Sunar, B.: Robust finite field arithmetic for fault-tolerant public-key cryptography. In: Breveglieri, L., Koren, I. (eds.) 2nd Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2005 (September 2005)","DOI":"10.1007\/11889700_18"},{"issue":"1","key":"15_CR13","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TC.2007.70784","volume":"57","author":"G. Gaubatz","year":"2008","unstructured":"Gaubatz, G., Sunar, B., Savas, E.: Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults. IEEE Transactions on Computers\u00a057(1), 126\u2013138 (2008)","journal-title":"IEEE Transactions on Computers"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J. Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic pUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 63\u201380. Springer, Heidelberg (2007)"},{"key":"15_CR15","unstructured":"Hammouri, G., Ozturk, E., Sunar, B.: A Tamper-Proof, Lightweight and Secure Authentication Scheme (under review)"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-540-68914-0_21","volume-title":"Applied Cryptography and Network Security","author":"G. Hammouri","year":"2008","unstructured":"Hammouri, G., Sunar, B.: PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.\u00a05037, pp. 346\u2013365. Springer, Heidelberg (2008)"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-540-74735-2_10","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"M. Joye","year":"2007","unstructured":"Joye, M.: Highly Regular Right-to-Left Algorithms for Scalar Multiplication. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, p. 135. Springer, Heidelberg (2007)"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Joye, M., Yen, S.M.: The Montgomery Powering Ladder. In: Cryptographic Hardware and Embedded Systems-Ches 2002: 4th International Workshop, Redwood Shores, CA, USA: Revised Papers, August 13-15 (2002)","DOI":"10.1007\/3-540-36400-5_22"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Karpovsky, M., Kulikowski, K.J., Taubin, A.: Differential fault analysis attack resistant architectures for the advanced encryption standard. In: Proc. World Computing Congress (2004)","DOI":"10.1007\/1-4020-8147-2_12"},{"key":"15_CR20","first-page":"93","volume-title":"DSN 2004: Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004)","author":"M. Karpovsky","year":"2004","unstructured":"Karpovsky, M., Kulikowski, K.J., Taubin, A.: Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard. In: DSN 2004: Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), Washington, DC, USA, p. 93. IEEE Computer Society Press, Los Alamitos (2004)"},{"issue":"8","key":"15_CR21","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TIT.2004.831844","volume":"50","author":"M. Karpovsky","year":"2004","unstructured":"Karpovsky, M., Taubin, A.: A new class of nonlinear systematic error detecting codes. IEEE Trans. Info. Theory\u00a050(8), 1818\u20131820 (2004)","journal-title":"IEEE Trans. Info. Theory"},{"issue":"12","key":"15_CR22","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.1109\/TCAD.2002.804378","volume":"21","author":"R. Karri","year":"2002","unstructured":"Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. IEEE Transactions on computer-aided design of integrated circuits and systems\u00a021(12), 1509\u20131517 (2002)","journal-title":"IEEE Transactions on computer-aided design of integrated circuits and systems"},{"key":"15_CR23","unstructured":"Kocar, O.: Estimation of keys stored in cmos cryptographic device after baking by using the charge shift. Cryptology ePrint Archive, Report 2007\/134 (2007), http:\/\/eprint.iacr.org\/"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Advances in Cryptology-Crypto 1999: 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"15_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Krasniewski, A.: Concurrent error detection in sequential circuits implemented using fpgas with embedded memory blocks. In: Proceedings of the 10th IEEE International On-Line Testing Symposium (IOLTS 2004) (2004)","DOI":"10.1109\/OLT.2004.1319661"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Kulikowski, K.J., Karpovsky, M., Taubin, A.: Robust codes for fault attack resistant cryptographic hardware. In: Workshop on Fault Diagnosis and Tolerance in Cryptography 2005 (FTDC 2005) (2005)","DOI":"10.1007\/11889700_17"},{"key":"15_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/11889700_17","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"K.J. Kulikowski","year":"2006","unstructured":"Kulikowski, K.J., Karpovsky, M., Taubin, A.: Fault attack resistant cryptographic hardware with uniform error detection. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 185\u2013195. Springer, Heidelberg (2006)"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Lee, J.W., Daihyun, L., Gassend, B., Suhamd, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium of VLSI Circuits, pp. 176\u2013179 (2004)","DOI":"10.1109\/VLSIC.2004.1346548"},{"issue":"10","key":"15_CR30","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D. Lim","year":"2005","unstructured":"Lim, D., Lee, J.W., Gassend, B., Edward Suh, G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst.\u00a013(10), 1200\u20131205 (2005)","journal-title":"IEEE Trans. VLSI Syst."},{"issue":"5","key":"15_CR31","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2005.122","volume":"3","author":"D. Naccache","year":"2005","unstructured":"Naccache, D.: Finding faults. IEEE Security and Privacy\u00a03(5), 61\u201365 (2005)","journal-title":"IEEE Security and Privacy"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Ozturk, E., Hammouri, G., Sunar, B.: Towards robust low cost authentication for pervasive devices. In: PERCOM 2008: Proceedings of the Sixth IEEE International Conference on Pervasive Computing and Communications (2008)","DOI":"10.1109\/PERCOM.2008.54"},{"issue":"7","key":"15_CR33","first-page":"652","volume":"4","author":"R. Posch","year":"1998","unstructured":"Posch, R.: Protecting Devices by Active Coating. Journal of Universal Computer Science\u00a04(7), 652\u2013668 (1998)","journal-title":"Journal of Universal Computer Science"},{"key":"15_CR34","unstructured":"Ravikanth, P.S.: Physical One-Way Functions. PhD thesis, Massachusetts Institute Of Technology (2001)"},{"key":"15_CR35","volume-title":"Interior Point Methods for Linear Optimization","author":"C. Roos","year":"2005","unstructured":"Roos, C., Terlaky, T., Vial, J.-P.: Interior Point Methods for Linear Optimization, 2nd edn. Springer, Heidelberg (2005)","edition":"2"},{"key":"15_CR36","unstructured":"Schmidt, J.M., Hutter, M.: Optical and em fault-attacks on crt-based rsa: Concrete results. In: Austrochip 2007: Proceedings of the 15th Austrian Workshop on Microelectronics (2007)"},{"key":"15_CR37","unstructured":"Skoric, B., Maubach, S., Kevenaar, T., Tuyls, P.: Information-theoretic Analysis of Coating PUFs. Cryptology ePrint Archive, Report 2006\/101 (2006)"},{"key":"15_CR38","doi-asserted-by":"crossref","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical Fault Induction Attacks. In: Cryptographic Hardware and Embedded Systems-Ches 2002: 4th International Workshop, Redwood Shores, CA, USA, Revised Papers, August 13-15 (2002)","DOI":"10.1007\/3-540-36400-5_2"},{"issue":"4","key":"15_CR39","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/TC.2005.61","volume":"54","author":"D. Sokolov","year":"2005","unstructured":"Sokolov, D., Murphy, J., Bystrov, A.V., Yakovlev, A.: Design and Analysis of Dual-Rail Circuits for Security Applications. IEEE Transactions on Computers\u00a054(4), 449\u2013460 (2005)","journal-title":"IEEE Transactions on Computers"},{"key":"15_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/11894063_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Schrijen, G.-J., \u0160kori\u0107, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-proof hardware from protective coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 369\u2013383. Springer, Heidelberg (2006)"},{"key":"15_CR41","series-title":"Philips Research Book Series","volume-title":"AmIware: Hardware Technology Drivers of Ambient Intelligence","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Skoric, B.: Secret Key Generation from Classical Physics: Physical Uncloneable Functions. In: Mukherjee, S., Aarts, E., Roovers, R., Widdershoven, F., Ouwerkerk, M. (eds.) AmIware: Hardware Technology Drivers of Ambient Intelligence. Philips Research Book Series, vol.\u00a05. Springer, Heidelberg (2006)"},{"key":"15_CR42","first-page":"483","volume-title":"Proceedings of the 21st Annual Computer Security Applications Conference","author":"J. Waddle","year":"2005","unstructured":"Waddle, J., Wagner, D.: Fault Attacks on Dual-Rail Encoded Systems. In: Proceedings of the 21st Annual Computer Security Applications Conference, pp. 483\u2013494. ACSAC. IEEE Computer Society, Washington (2005), http:\/\/dx.doi.org\/10.1109\/CSAC.2005.25"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2008"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00730-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T17:28:21Z","timestamp":1558200501000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00730-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642007293","9783642007309"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00730-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}