{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:52:19Z","timestamp":1725565939286},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642158247"},{"type":"electronic","value":"9783642158254"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15825-4_22","type":"book-chapter","created":{"date-parts":[[2010,9,13]],"date-time":"2010-09-13T05:11:59Z","timestamp":1284354719000},"page":"168-177","source":"Crossref","is-referenced-by-count":5,"title":["Policy Gradients for Cryptanalysis"],"prefix":"10.1007","author":[{"given":"Frank","family":"Sehnke","sequence":"first","affiliation":[]},{"given":"Christian","family":"Osendorfer","sequence":"additional","affiliation":[]},{"given":"Jan","family":"S\u00f6lter","sequence":"additional","affiliation":[]},{"given":"J\u00fcrgen","family":"Schmidhuber","sequence":"additional","affiliation":[]},{"given":"Ulrich","family":"R\u00fchrmair","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5589","key":"22_CR1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1126\/science.1074376","volume":"297","author":"R. Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science\u00a0297(5589), 20\u201326 (2002)","journal-title":"Science"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security-CCS, pp. 148\u2013160 (2002)","DOI":"10.1145\/586110.586132"},{"key":"22_CR3","unstructured":"Pappu, R.: Physical One-Way Functions. Phd thesis, MIT"},{"key":"22_CR4","volume-title":"Strong pufs: Models, constructions and security proofs, Towards Hardware Intrinsic Security: Foundation and Practice","author":"U. R\u00fchrmair","year":"2010","unstructured":"R\u00fchrmair, U., Busch, H., Katzenbeisser, S.: Strong pufs: Models, constructions and security proofs, Towards Hardware Intrinsic Security: Foundation and Practice. Springer, Heidelberg (2010)"},{"key":"22_CR5","unstructured":"Lim, D.: Extracting Secret Keys from Integrated Circuits. Msc thesis, MIT (2004)"},{"issue":"4","key":"22_CR6","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1016\/j.neunet.2009.12.004","volume":"23","author":"F. Sehnke","year":"2010","unstructured":"Sehnke, F., Osendorfer, C., R\u00fcckstie\u00df, T., Graves, A., Peters, J., Schmidhuber, J.: Parameter-exploring policy gradients. Neural Networks\u00a023(4), 551\u2013559 (2010)","journal-title":"Neural Networks"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Stoyanova, V., Schmidhuber, J.: Machine learning attacks on physical unclonable functions. In: ACM Conference on Computer and Communications Security-CCS (2010) (to be published)","DOI":"10.1145\/1866307.1866335"},{"key":"22_CR8","volume-title":"Evolution and Optimum Seeking: The Sixth Generation","author":"H. Schwefel","year":"1993","unstructured":"Schwefel, H.: Evolution and Optimum Seeking: The Sixth Generation. John Wiley & Sons, Inc., New York (1993)"},{"issue":"11","key":"22_CR9","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1002\/cpe.805","volume":"16","author":"B. Gassend","year":"2004","unstructured":"Gassend, B., Lim, D., Clarke, D., Van Dijk, M., Devadas, S.: Identification and authentication of integrated circuits. Concurrency and Computation: Practice & Experience\u00a016(11), 1077\u20131098 (2004)","journal-title":"Concurrency and Computation: Practice & Experience"},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1109\/ICCAD.2008.4681648","volume-title":"Proceedings of the 2008 IEEE\/ACM International Conference on Computer-Aided Design","author":"M. Majzoobi","year":"2008","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Lightweight secure PUFs. In: Proceedings of the 2008 IEEE\/ACM International Conference on Computer-Aided Design, pp. 670\u2013673. IEEE Press, Los Alamitos (2008)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Testing techniques for hardware security. In: Proceedings of the International Test Conference (ITC), pp. 1\u201310 (2008)","DOI":"10.1109\/TEST.2008.4700636"},{"key":"22_CR12","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195099713.001.0001","volume-title":"Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms","author":"T. B\u00e4ck","year":"1996","unstructured":"B\u00e4ck, T.: Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms. Oxford University Press, USA (1996)"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-540-87536-9_40","volume-title":"Artificial Neural Networks - ICANN 2008","author":"F. Sehnke","year":"2008","unstructured":"Sehnke, F., Osendorfer, C., R\u00fcckstie\u00df, T., Graves, A., Peters, J., Schmidhuber, J.: Policy gradients with parameter-based exploration for control. In: K\u016frkov\u00e1, V., Neruda, R., Koutn\u00edk, J. (eds.) ICANN 2008, Part I. LNCS, vol.\u00a05163, pp. 387\u2013396. Springer, Heidelberg (2008)"},{"key":"22_CR14","volume-title":"Proceedings of the 44th annual Design Automation Conference","author":"G. Suh","year":"2007","unstructured":"Suh, G., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th annual Design Automation Conference, vol.\u00a014, ACM, New York (2007)"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Lee, J., Lim, D., Gassend, B., Suh, G., Van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proceedings of the IEEE VLSI Circuits Symposium, p. 176 (2004)","DOI":"10.1109\/VLSIC.2004.1346548"},{"issue":"10","key":"22_CR16","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D. Lim","year":"2005","unstructured":"Lim, D., Lee, J., Gassend, B., Suh, G., Van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration Systems\u00a013(10), 1200 (2005)","journal-title":"IEEE Transactions on Very Large Scale Integration Systems"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks \u2013 ICANN 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15825-4_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T13:34:57Z","timestamp":1636464897000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15825-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642158247","9783642158254"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15825-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}