{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:51Z","timestamp":1725899991740},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_21","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T07:24:20Z","timestamp":1277796260000},"page":"290-297","source":"Crossref","is-referenced-by-count":6,"title":["The PUF Promise"],"prefix":"10.1007","author":[{"given":"Heike","family":"Busch","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Miroslava","family":"Sot\u00e1kov\u00e1","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Radu","family":"Sion","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/1456482.1456490","volume-title":"VMSec","author":"M.J. Atallah","year":"2008","unstructured":"Atallah, M.J., Bryant, E., Korb, J.T., Rice, J.R.: Binding software to specific native hardware in a vm environment: the puf challenge and opportunity. In: VMSec, pp. 45\u201348. ACM, New York (2008)"},{"key":"21_CR2","unstructured":"Bauder, D.W.: An anti-counterfeiting concept for currency systems. Research report PTK-11990. Sandia National Labs. Albuquerque, NM (1983)"},{"key":"21_CR3","first-page":"211","volume-title":"PerCom","author":"L. Bolotnyy","year":"2007","unstructured":"Bolotnyy, L., Robins, G.: Physically unclonable function-based security and privacy in rfid systems. In: PerCom, pp. 211\u2013220. IEEE Computer Society, Los Alamitos (2007)"},{"key":"21_CR4","volume-title":"Design of High Performance Microprocessor Circuits","author":"D.S. Boning","year":"2000","unstructured":"Boning, D.S., Nassif, S.: Models of process variations in device and interconnect. In: Design of High Performance Microprocessor Circuits. IEEE Press, Los Alamitos (2000)"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-642-10838-9_22","volume-title":"Information Security Applications","author":"H. Busch","year":"2009","unstructured":"Busch, H., Katzenbeisser, S., Baecher, P.: Puf-based authentication protocols - revisited. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol.\u00a05932, pp. 296\u2013308. Springer, Heidelberg (2009)"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Chinnery, D.G., Keutzer, K.: Closing the gap between asic and custom: an asic perspective. In: DAC, pp. 637\u2013642 (2000)","DOI":"10.1145\/337292.337602"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data\u00a038(1), 97\u2013139 (2008)","DOI":"10.1137\/060651380"},{"key":"21_CR8","first-page":"262","volume-title":"ISC","author":"K.B. Frikken","year":"2009","unstructured":"Frikken, K.B., Blanton, M., Atallah, M.J.: Robust authentication using physically unclonable functions. In: ISC, pp. 262\u2013277. Springer, Heidelberg (2009)"},{"key":"21_CR9","first-page":"148","volume-title":"ACM Conference on Computer and Communications Security","author":"B. Gassend","year":"2002","unstructured":"Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Silicon physical random functions. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security, pp. 148\u2013160. ACM, New York (2002)"},{"key":"21_CR10","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1145\/952532.952593","volume-title":"SAC","author":"B. Gassend","year":"2003","unstructured":"Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Delay-based circuit authentication and applications. In: SAC, pp. 294\u2013301. ACM, New York (2003)"},{"issue":"11","key":"21_CR11","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1002\/cpe.805","volume":"16","author":"B. Gassend","year":"2004","unstructured":"Gassend, B., Lim, D., Clarke, D., Devadas, S., van Dijk, M.: Identification and authentication of integrated circuits. Concurrency and Computation: Practice and Experience\u00a016(11), 1077\u20131098 (2004)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"21_CR12","unstructured":"Gassend, B.L.P.: Physical random functions. Master thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology (2003)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Gora, M., Maiti, A., Schaumont, P.: A flexible design flow for software ip binding in commodity fpga. In: SIES 2009, pp. 211\u2013218 (2009)","DOI":"10.1109\/SIES.2009.5196217"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J. Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: Fpga intrinsic pufs and their use for ip protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 63\u201380. Springer, Heidelberg (2007)"},{"key":"21_CR15","first-page":"3186","volume-title":"ISCAS","author":"J. Guajardo","year":"2008","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: Brand and ip protection with physical unclonable functions. In: ISCAS, pp. 3186\u20133189. IEEE, Los Alamitos (2008)"},{"key":"21_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-540-68914-0_21","volume-title":"Applied Cryptography and Network Security","author":"G. Hammouri","year":"2008","unstructured":"Hammouri, G., Sunar, B.: Puf-hb: A tamper-resilient hb based authentication protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.\u00a05037, pp. 346\u2013365. Springer, Heidelberg (2008)"},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1109\/ISIT.2006.261765","volume-title":"Proc. IEEE International Symposium on Information Theory 2006","author":"T. Ignatenko","year":"2006","unstructured":"Ignatenko, T., Schrijen, G.-J., \u0160kori\u0107, B., Tuyls, P., Willems, F.M.J.: Estimating the secrecy rate of physical uncloneable functions with the context-tree weighting method. In: Proc. IEEE International Symposium on Information Theory 2006, pp. 499\u2013503. IEEE Press, Los Alamitos (2006)"},{"key":"21_CR18","first-page":"67","volume-title":"HOST","author":"S.S. Kumar","year":"2008","unstructured":"Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.J., Tuyls, P.: The butterfly puf: Protecting ip on every fpga. In: HOST, pp. 67\u201370. IEEE Computer Society, Los Alamitos (2008)"},{"key":"21_CR19","first-page":"176","volume-title":"Proc. of the IEEE VLSI Circuits Symposium","author":"J.W. Lee","year":"2004","unstructured":"Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proc. of the IEEE VLSI Circuits Symposium, pp. 176\u2013179. IEEE Press, Los Alamitos (2004)"},{"key":"21_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1007\/3-540-48329-2_39","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"F.T. Leighton","year":"1994","unstructured":"Leighton, F.T., Micali, S.: Secret-key agreement without public-key cryptography. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 456\u2013479. Springer, Heidelberg (1994)"},{"issue":"10","key":"21_CR21","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D. Lim","year":"2005","unstructured":"Lim, D., Lee, J.W., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems\u00a013(10), 1200\u20131205 (2005)","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"21_CR22","unstructured":"Lim, D.: Extracting secret keys from integrated circuits. Master thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology (2004)"},{"key":"21_CR23","unstructured":"Pappu, R.S.: Physical One-Way Functions. Phd thesis, Massachusetts Institute of Technology, Massachusetts Institute of Technology (March 2001)"},{"issue":"5589","key":"21_CR24","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R.S. Pappu","year":"2002","unstructured":"Pappu, R.S., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science\u00a0297(5589), 2026\u20132030 (2002)","journal-title":"Science"},{"issue":"7","key":"21_CR25","first-page":"652","volume":"4","author":"R. Posch","year":"1998","unstructured":"Posch, R.: Protecting devices by active coating. J. UCS\u00a04(7), 652\u2013668 (1998)","journal-title":"J. UCS"},{"key":"21_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/11894063_25","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"E. Simpson","year":"2006","unstructured":"Simpson, E., Schaumont, P.: Offline hardware\/software authentication for reconfigurable platforms. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 311\u2013323. Springer, Heidelberg (2006)"},{"key":"21_CR27","first-page":"9","volume-title":"DAC","author":"G.E. Suh","year":"2007","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: DAC, pp. 9\u201314. IEEE, Los Alamitos (2007)"},{"issue":"6","key":"21_CR28","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1109\/MDT.2007.179","volume":"24","author":"G.E. Suh","year":"2007","unstructured":"Suh, G.E., O\u2019Donnell, C.W., Devadas, S.: Aegis: A single-chip secure processor. IEEE Design & Test of Computers\u00a024(6), 570\u2013580 (2007)","journal-title":"IEEE Design & Test of Computers"},{"key":"21_CR29","first-page":"25","volume-title":"ISCA","author":"G.E. Suh","year":"2005","unstructured":"Suh, G.E., O\u2019Donnell, C.W., Sachdev, I., Devadas, S.: Design and implementation of the aegis single-chip secure processor using physical random functions. In: ISCA, pp. 25\u201336. IEEE Computer Society, Los Alamitos (2005)"},{"key":"21_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1007\/3-540-63173-9_61","volume-title":"Evolvable Systems: From Biology to Hardware","author":"A. Thompson","year":"1997","unstructured":"Thompson, A.: An evolved circuit, intrinsic in silicon, entwined with physics. In: Higuchi, T., Iwata, M., Weixin, L. (eds.) ICES 1996. LNCS, vol.\u00a01259, pp. 390\u2013405. Springer, Heidelberg (1997)"},{"key":"21_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/11894063_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Schrijen, G.J., Skoric, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-proof hardware from protective coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 369\u2013383. Springer, Heidelberg (2006)"},{"key":"21_CR32","doi-asserted-by":"crossref","unstructured":"Tuyls, P., \u0160kori\u0107, B.: Strong Authentication with Physical Unclonable Functions. In: Security, Privacy, and Trust in Modern Data Management, p. 133 (2007)","DOI":"10.1007\/978-3-540-69861-6_10"},{"key":"21_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/11507840_15","volume-title":"Financial Cryptography and Data Security","author":"P. Tuyls","year":"2005","unstructured":"Tuyls, P., \u0160kori\u0107, B., Stallinga, S., Akkermans, A.H.M., Ophey, W.: Information-theoretic security analysis of physical uncloneable functions. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol.\u00a03570, pp. 141\u2013155. Springer, Heidelberg (2005)"},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"\u0160kori\u0107, B., Maubach, S., Kevenaar, T., Tuyls, P.: Information-theoretic analysis of capacitive physical unclonable functions. Journal of Applied physics\u00a0100 (2006)","DOI":"10.1063\/1.2209532"},{"key":"21_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/11496137_28","volume-title":"Applied Cryptography and Network Security","author":"B. \u0160kori\u0107","year":"2005","unstructured":"\u0160kori\u0107, B., Tuyls, P., Ophey, W.: Robust key extraction from physical unclonable functions. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 407\u2013422. Springer, Heidelberg (2005)"},{"key":"21_CR36","unstructured":"Verayo, http:\/\/www.verayo.com"},{"key":"21_CR37","unstructured":"IntrinsicID, http:\/\/www.intrinsic-id.com"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T15:51:54Z","timestamp":1685634714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}