{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T00:25:40Z","timestamp":1777508740753,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642150302","type":"print"},{"value":"9783642150319","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15031-9_25","type":"book-chapter","created":{"date-parts":[[2010,8,7]],"date-time":"2010-08-07T11:34:35Z","timestamp":1281180875000},"page":"366-382","source":"Crossref","is-referenced-by-count":78,"title":["The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes"],"prefix":"10.1007","author":[{"given":"Daisuke","family":"Suzuki","sequence":"first","affiliation":[]},{"given":"Koichi","family":"Shimizu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"Pappu, R.S.: Physical One-way Functions. Ph.D. Thesis, M.I.T. (2001), http:\/\/pubs.media.mit.edu\/pubs\/papers\/01.03.pappuphd.powf.pdf"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, M., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"key":"25_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11605805_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Batina, L.: RFID-Tags for Anti-Counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 115\u2013131. Springer, Heidelberg (2006)"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon Physical Random Functions. In: Proc., of the 9th ACM Conference on Computer and Communications Security (CCS 2002), pp. 148\u2013160 (2002)","DOI":"10.1145\/586110.586132"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J. Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., S\u0303chrijen, G.J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 63\u201380. Springer, Heidelberg (2007)"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication Applications. In: Proc. of the IEEE VLSI Circuits Symposium, pp. 176\u2013179 (2004)","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical Unclonable Functions for Device Authentication and Secret Key Generation. In: Proc. of the 44th annual Design Automation Conference (DAC 2007), pp. 9\u201314 (2007)","DOI":"10.1145\/1278480.1278484"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Kumar, S.S., Guajardo, J., Maes, R., S\u0303chrijen, G.J., Tuyls, P.: Extended Abstract: The Butterfly PUF: Protecting IP on every FPGA. In: Proc. of the IEEE International Workshop on Hardware-Oriented Security and Trust 2008 (HOST 2008), pp. 67\u201370 (2008)","DOI":"10.1109\/HST.2008.4559053"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Lightweight secure PUFs. In: Proc. of the IEEE\/ACM International Conference on Computer-Aided Design (ICCAD 2008), pp. 670\u2013673 (2008)","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-85053-3_12","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"C. B\u0308osch","year":"2008","unstructured":"B\u0308osch, C., Guajardo, J., Sadeghi, A.R., Shokrollahi, J., Tuyls, P.: Efficient Helper Data Key Extractor on FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 181\u2013197. Springer, Heidelberg (2008)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs. In: Proc. of the 2009 IEEE International Symposium on Information Theory (ISIT 2009), pp. 2101\u20132105 (2009)","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"25_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-04138-9_24","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"R. Maes","year":"2009","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: A Soft Decision Helper Data Algorithm for SRAM PUFs. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 332\u2013347. Springer, Heidelberg (2009)"},{"key":"25_CR13","unstructured":"Chopra, J., Colopy, R.L.: SRAM Characteristics as Physical Unclonable Functions. Worcester Polytechnic Institute Electric Project Collection (2009), http:\/\/www.wpi.edu\/Pubs\/E-project\/Available\/E-project-031709-141338\/"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., S\u00f6lter, J., Sehnke, F.: On the Foundations of Physical Unclonable Functions. Cryptology ePrint Archive, 2009\/277 (2009)","DOI":"10.1145\/1866307.1866335"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Najm, F.N., Menezes, N.: Statistical Timing Analysis Based on a Timing Yield Model. In: Proc. of the 41st annual Design Automation Conference (DAC 2004), pp. 460\u2013465 (2004)","DOI":"10.1145\/996566.996696"},{"key":"25_CR16","unstructured":"Standard Delay Format Specification version 3.0 (1995), http:\/\/www.eda.org\/sdf\/sdf_3.0.pdf"},{"issue":"6","key":"25_CR17","first-page":"416","volume":"92","author":"T. Hiramoto","year":"2009","unstructured":"Hiramoto, T., Takeuchi, K., Nisida, A.: Variability of Characterisics in Scaled MOSFETs. J. IEICE\u00a092(6), 416\u2013426 (2009)","journal-title":"J. IEICE"},{"key":"25_CR18","unstructured":"Berkelaar, M.: Statistical Delay Calculation, a Linear Time Method. In: Proc. of the International Workshop on Timing Analysis (TAU\u201997), pp. 15\u201324 (1997)"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Ignatenko, T., Schrijen, G.J., Skoric, B., Tuyls, P., Willems, F.: Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method. In: Proc. of the 2006 IEEE International Symposium on Information Theory (ISIT 2006), pp. 499\u2013503 (2006)","DOI":"10.1109\/ISIT.2006.261765"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems, CHES 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15031-9_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T13:45:09Z","timestamp":1685713509000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15031-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642150302","9783642150319"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15031-9_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}