{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:56:37Z","timestamp":1762505797418},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642215988"},{"type":"electronic","value":"9783642215995"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21599-5_5","type":"book-chapter","created":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T00:31:47Z","timestamp":1308097907000},"page":"63-77","source":"Crossref","is-referenced-by-count":14,"title":["A Practical Device Authentication Scheme Using SRAM PUFs"],"prefix":"10.1007","author":[{"given":"Patrick","family":"Koeberl","sequence":"first","affiliation":[]},{"given":"Jiangtao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Rajan","sequence":"additional","affiliation":[]},{"given":"Claire","family":"Vishik","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"1149.1-1990 - IEEE Standard Test Access Port and Boundary-Scan Architecture, \n                    \n                      http:\/\/standards.ieee.org\/findstds\/standard\/1149.1-1990.html"},{"key":"5_CR2","unstructured":"Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., Tuyls, P.: PUF-PRFs: A new tamper-resilient cryptographic primitive. In: Advances in Cryptology \u2013 EUROCRYPT 2009 Poster Session, pp. 96\u2013102 (2000)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/978-3-642-10366-7_40","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"F. Armknecht","year":"2009","unstructured":"Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., Tuyls, P.: Memory leakage-resilient encryption based on physically unclonable functions. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 685\u2013702. Springer, Heidelberg (2009)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"key":"5_CR5","unstructured":"Federal Information Processing Standard 186-3: Digital Signature Standard (DSS), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips186-3\/fips_186-3.pdf"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled physical random functions. In: Proceedings of the 18th Annual Computer Security Conference (2002)","DOI":"10.1109\/CSAC.2002.1176287"},{"key":"5_CR7","first-page":"148","volume-title":"ACM Conference on Computer and Communications Security","author":"B. Gassend","year":"2002","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security, pp. 148\u2013160. ACM Press, New York (2002)"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J. Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic pUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 63\u201380. Springer, Heidelberg (2007)"},{"issue":"9","key":"5_CR9","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1109\/TC.2008.212","volume":"58","author":"D.E. Holcomb","year":"2009","unstructured":"Holcomb, D.E., Burleson, W.P., Fu, K.: Power-up sram state as an identifying fingerprint and source of true random numbers. IEEE Transactions on Computers\u00a058(9), 1198\u20131210 (2009)","journal-title":"IEEE Transactions on Computers"},{"key":"5_CR10","unstructured":"ISO\/IEC16022:2006 Data Matrix bar code symbology specification, \n                    \n                      http:\/\/www.iso.org\/iso\/catalogue_detail.htm?csnumber=44230"},{"key":"5_CR11","unstructured":"U. S. G. A. Office. Defense supplier base: Dod should leverage ongoing initiatives in developing its program to mitigate risk of counterfeit parts. GAO-10-389 (March 2010)"},{"key":"5_CR12","unstructured":"Pappu, R.S.: Physical one-way functions. PhD thesis. Massachusetts Institute of Technology (March 2001)"},{"key":"5_CR13","unstructured":"Semiconductor Industry Association, \n                    \n                      http:\/\/www.sia-online.org\/cs\/anticounterfeiting"},{"key":"5_CR14","first-page":"9","volume-title":"Design Automation Conference","author":"G.E. Suh","year":"2007","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference, pp. 9\u201314. ACM Press, New York (2007)"},{"key":"5_CR15","unstructured":"S. T20-1109. Specification for authentication of semiconductors and related products (2009), \n                    \n                      http:\/\/www.semi.org\/"},{"key":"5_CR16","unstructured":"Trusted Computing Group. TCG TPM specification 1.2 (2003), \n                    \n                      http:\/\/www.trustedcomputinggroup.org"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11605805_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Batina, L.: Rfid-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 115\u2013131. Springer, Heidelberg (2006)"},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1867635.1867644","volume-title":"Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing, STC 2010","author":"V. Leest van der","year":"2010","unstructured":"van der Leest, V., Schrijen, G.-J., Handschuh, H., Tuyls, P.: Hardware intrinsic security from d flip-flops. In: Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing, STC 2010, pp. 53\u201362. ACM, New York (2010)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21599-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T04:12:30Z","timestamp":1553832750000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21599-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642215988","9783642215995"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21599-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}