{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:08:22Z","timestamp":1725574102357},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642183805"},{"type":"electronic","value":"9783642183812"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18381-2_3","type":"book-chapter","created":{"date-parts":[[2011,1,4]],"date-time":"2011-01-04T16:01:51Z","timestamp":1294156911000},"page":"26-45","source":"Crossref","is-referenced-by-count":11,"title":["SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?"],"prefix":"10.1007","author":[{"given":"Ulrich","family":"R\u00fchrmair","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"http:\/\/www.cbsnews.com\/stories\/2010\/02\/15\/business\/main6209772.shtml"},{"key":"3_CR2","unstructured":"http:\/\/www.bbc.co.uk\/news\/10569081"},{"key":"3_CR3","unstructured":"http:\/\/www.eurosmart.com\/images\/doc\/Eurosmart-in-the-press\/2006\/cardtechnologytoday_dec2006.pdf"},{"key":"3_CR4","unstructured":"http:\/\/www.gsaietsemiconductorforum.com\/2010\/delegate\/documents\/GASSELGSALondon20100518presented.pdf (Slide 23)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-85174-5_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"T. Eisenbarth","year":"2008","unstructured":"Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Manzuri Shalmani, M.T.: On the power of power analysis in the real world: A complete break of the keeLoq code hopping scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 203\u2013220. Springer, Heidelberg (2008)"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-642-14577-3_28","volume-title":"Financial Cryptography and Data Security","author":"T. Kasper","year":"2010","unstructured":"Kasper, T., Silbermann, M., Paar, C.: All you can eat or breaking a real-world contactless payment system. In: Sion, R. (ed.) FC 2010. LNCS, vol.\u00a06052, pp. 343\u2013350. Springer, Heidelberg (2010)"},{"key":"3_CR7","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"R.J. Anderson","year":"2008","unstructured":"Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd edn. Wiley, Chichester (2008) ISBN: 978-0-470-06852-6","edition":"2"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R. Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-Way Functions. Science\u00a0297, 2026\u20132030 (2002)","journal-title":"Science"},{"key":"3_CR9","unstructured":"Pappu, R.: Physical One-Way Functions, PhD Thesis, MIT"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security 2002, pp. 148\u2013160 (2002)","DOI":"10.1145\/586110.586132"},{"issue":"11","key":"3_CR11","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1002\/cpe.805","volume":"16","author":"B. Gassend","year":"2004","unstructured":"Gassend, B., Lim, D., Clarke, D., Dijk, M.v., Devadas, S.: Identification and authentication of integrated circuits. Concurrency and Computation: Practice & Experience\u00a016(11), 1077\u20131098 (2004)","journal-title":"Concurrency and Computation: Practice & Experience"},{"key":"3_CR12","volume-title":"Security, Privacy and Trust in Modern Data Management","author":"P. Tuyls","year":"2007","unstructured":"Tuyls, P., Skoric, B.: Strong Authentication with Physical Unclonable Functions. In: Petkovic, M., Jonker, W. (eds.) Security, Privacy and Trust in Modern Data Management, Springer, Heidelberg (2007)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Edward Suh, G., Devadas, S.: Physical Unclonable Functions for Device Authentication and Secret Key Generation. In: DAC 2007, pp. 9\u201314 (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Gassend, B., Dijk, M.v., Clarke, D.E., Torlak, E., Devadas, S., Tuyls, P.: Controlled physical random functions and applications. ACM Trans. Inf. Syst. Secur. 10(4) (2008)","DOI":"10.1145\/1284680.1284683"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/978-3-642-13869-0_31","volume-title":"Trust and Trustworthy Computing","author":"U. R\u00fchrmair","year":"2010","unstructured":"R\u00fchrmair, U.: Oblivious Transfer based on Physical Unclonable Functions (Extended Abstract). In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol.\u00a06101, pp. 430\u2013440. Springer, Heidelberg (2010)"},{"key":"3_CR16","unstructured":"R\u00fchrmair, U.: SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions. Cryptology ePrint Archive, Report 2009\/255 (2009)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Chen, Q., Lugli, P., Schlichtmann, U., Stutzmann, M., Csaba, G.: Towards Electrical, Integrated Implementations of SIMPL Systems. Cryptology ePrint Archive, Report 2009\/278 (2009)","DOI":"10.1007\/978-3-642-12368-9_22"},{"key":"3_CR18","unstructured":"Chen, Q., Csaba, G., Ju, X., Natarajan, S.B., Lugli, P., Stutzmann, M., Schlichtmann, U., R\u00fchrmair, U.: Analog Circuits for Physical Cryptography. In: 12th International Symposium on Integrated Circuits (ISIC 2009), Singapore, December 14-16 (2009)"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-642-12368-9_22","volume-title":"Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices","author":"U. R\u00fchrmair","year":"2010","unstructured":"R\u00fchrmair, U., Chen, Q., Stutzmann, M., Lugli, P., Schlichtmann, U., Csaba, G.: Towards electrical, integrated implementations of SIMPL systems. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds.) WISTP 2010. LNCS, vol.\u00a06033, pp. 277\u2013292. Springer, Heidelberg (2010)"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Chen, Q., Csaba, G., Lugli, P., Schlichtmann, U., Stutzmann, M., R\u00fchrmair, U.: Circuit-based Approaches to SIMPL Systems. Accepted by Journal of Circuits, Systems and Computers (2010) (to appear)","DOI":"10.1142\/S0218126611007098"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-642-04431-1_15","volume-title":"Information Hiding","author":"N. Beckmann","year":"2009","unstructured":"Beckmann, N., Potkonjak, M.: Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol.\u00a05806, pp. 206\u2013220. Springer, Heidelberg (2009)"},{"key":"3_CR22","volume-title":"Towards Hardware Intrinsic Security: Foundation and Practice","author":"U. R\u00fchrmair","year":"2010","unstructured":"R\u00fchrmair, U., Busch, H., Katzenbeisser, S.: Strong PUFs: Models, Constructions and Security Proofs. In: Sadeghi, A.-R., Naccache, D. (eds.) Towards Hardware Intrinsic Security: Foundation and Practice, Springer, Heidelberg (2010) (to appear)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Gassend, B.: Physical Random Functions, MSc Thesis, MIT (2003)","DOI":"10.1145\/586131.586132"},{"key":"3_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-16435-4_1","volume-title":"Information Hiding","author":"M. Majzoobi","year":"2010","unstructured":"Majzoobi, M., Elnably, A., Koushanfar, F.: FPGA Time-Bounded Unclonable Authentication. In: B\u00f6hme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol.\u00a06387, pp. 1\u201316. Springer, Heidelberg (2010)"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J. Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PFs and Their Ue For IP Potection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 63\u201380. Springer, Heidelberg (2007)"},{"key":"#cr-split#-3_CR26.1","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling Attacks on Physical Unclonable Functions. In: 17th ACM Conference on Computer and Communications Security (2010);","DOI":"10.1145\/1866307.1866335"},{"key":"#cr-split#-3_CR26.2","unstructured":"Previous versions available from Cryptology ePrint Archive, Report 251\/2010"},{"key":"3_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/BFb0052345","volume-title":"Fast Software Encryption","author":"S. Halevi","year":"1997","unstructured":"Halevi, S., Krawczyk, H.: MMH: Software message authentication in the gbit\/Second rates. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 172\u2013189. Springer, Heidelberg (1997)"},{"key":"3_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-540-74735-2_24","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"G. DeJean","year":"2007","unstructured":"DeJean, G., Kirovski, D.: RF-DNA: Radio-Frequency Certificates of Authenticity. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 346\u2013363. Springer, Heidelberg (2007)"},{"key":"3_CR29","unstructured":"Kariakin, Y.: Authentication of Articles. Patent writing, WO\/1997\/024699 (1995), http:\/\/www.wipo.int\/pctdb\/en\/wo.jsp?wo=1997024699"},{"key":"3_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-03549-4_13","volume-title":"Financial Cryptography and Data Security","author":"D. Vijaywargi","year":"2009","unstructured":"Vijaywargi, D., Lewis, D., Kirovski, D.: Optical DNA. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 222\u2013229. Springer, Heidelberg (2009)"},{"key":"3_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-642-04138-9_25","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"G. Hammouri","year":"2009","unstructured":"Hammouri, G., Dana, A., Sunar, B.: CDs Have Fingerprints Too. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 348\u2013362. Springer, Heidelberg (2009)"},{"key":"3_CR32","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a0IT-22, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"3_CR33","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1145\/602382.602411","volume":"50","author":"A.C.-C. Yao","year":"2003","unstructured":"Yao, A.C.-C.: Classical physics and the Church-Turing Thesis. Journal of the ACM\u00a050(1), 100\u2013105 (2003)","journal-title":"Journal of the ACM"},{"key":"3_CR34","unstructured":"Aaronson, S.: NP-complete Problems and Physical Reality. In: Electronic Colloquium on Computational Complexity (ECCC), 026 (2005)"},{"issue":"5","key":"3_CR35","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P.W. Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM J. Comput.\u00a026(5), 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Csaba, G., Ju, X., Ma, Z., Chen, Q., Porod, W., Schmidhuber, J., Schlichtmann, U., Lugli, P., R\u00fchrmair, U.: Application of Mismatched Cellular Nonlinear Networks for Physical Cryptography. In: IEEE CNNA (2010)","DOI":"10.1109\/CNNA.2010.5430303"},{"key":"3_CR37","unstructured":"Lim, D.: Extracting Secret Keys from Integrated Circuits. M.Sc. Thesis, MIT (2004)"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Suh, G.E., O\u2019Donnell, C.W., Sachdev, I., Devadas, S.: Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions. In: Proc. 32nd ISCA, New York (2005)","DOI":"10.1109\/ISCA.2005.22"},{"issue":"1","key":"3_CR39","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MDT.2010.25","volume":"27","author":"M.-D. Yu","year":"2010","unstructured":"Yu, M.-D.(Mandel) Devadas, S.: Secure and Robust Error Correction for Physical Unclonable Functions. IEEE Design & Test of Computers\u00a027(1), 48\u201365 (2010)","journal-title":"IEEE Design & Test of Computers"},{"key":"3_CR40","unstructured":"R\u00fchrmair, U., Knobling, R., Weiersh\u00e4user, A., Urban, S., Finley, J.: Secure Integrated Optical Physical Unclonable Functions (2010) (in preparation)"},{"key":"3_CR41","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139170413","volume-title":"Optical Physics","author":"S.G. Lipson","year":"1995","unstructured":"Lipson, S.G.: Optical Physics, 3rd edn. Cambridge University Press, Cambridge (1995) ISBN 0-5214-3631-1","edition":"3"},{"key":"3_CR42","volume-title":"Experimentalphysik 2: Elektrizit\u00e4t und Optik","author":"W. Demtr\u00f6der","year":"2004","unstructured":"Demtr\u00f6der, W.: Experimentalphysik 2: Elektrizit\u00e4t und Optik. Springer, Heidelberg (2004) ISBN-10: 3540202102"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Zhou, D., Mawst, L.J.: Two-dimensional phase-locked antiguided vertical-cavity surface-emitting laser arrays. Applied Physics Letters (2000)","DOI":"10.1063\/1.1317545"},{"key":"3_CR44","unstructured":"S\u00f6lter, J.: Personal Communication (2010)"}],"container-title":["Lecture Notes in Computer Science","SOFSEM 2011: Theory and Practice of Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18381-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T21:27:08Z","timestamp":1637098028000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18381-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642183805","9783642183812"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18381-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}