{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:25:49Z","timestamp":1744086349463,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642328046"},{"type":"electronic","value":"9783642328053"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32805-3_3","type":"book-chapter","created":{"date-parts":[[2012,9,5]],"date-time":"2012-09-05T01:27:02Z","timestamp":1346808422000},"page":"26-38","source":"Crossref","is-referenced-by-count":4,"title":["Security Analysis of Image-Based PUFs for Anti-counterfeiting"],"prefix":"10.1007","author":[{"given":"Saloomeh","family":"Shariati","sequence":"first","affiliation":[]},{"given":"Fran\u00e7ois","family":"Koeune","sequence":"additional","affiliation":[]},{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Staake, T., Fleisch, E.: Countering Counterfeit Trade: Illicit Market Insights, Best-Practice Strategies, and Management Toolbox, 1st edn. Springer Publishing Company, Incorporated (2010)"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1109\/6144.991192","volume":"25","author":"S. Bastia","year":"2002","unstructured":"Bastia, S.: Next generation technologies to combat counterfeiting of electronic components. IEEE Trans. on Components and Packaging Tech.\u00a025, 175\u2013176 (2002)","journal-title":"IEEE Trans. on Components and Packaging Tech."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Chong, C.N., et al.: Anti-counterfeiting with a random pattern. In: Int. Conf. on Emerging Security Information, Systems and Tech., pp. 146\u2013153 (2008)","DOI":"10.1109\/SECURWARE.2008.12"},{"key":"3_CR4","unstructured":"Pappu, R.: Physical one-way functions. PhD thesis, MIT (March 2001)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Pappu, R., et al.: Physical one-way functions. Science\u00a0297 (2002)","DOI":"10.1126\/science.1074376"},{"key":"3_CR6","unstructured":"Shariati, S., Standaert, F.-X., Jacques, L., Macq, B.: Comprehensive study of image-based physical function system. Submitted to Journal of Cryptographic Engineering"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Tuyls, P., \u0160kori\u0107, B.: Strong authentication with physical unclonable functions. In: Security, Privacy, and Trust in Modern Data Management, pp. 133\u2013148 (2007)","DOI":"10.1007\/978-3-540-69861-6_10"},{"key":"3_CR8","unstructured":"Tuyls, P., et al.: Secure key storage and anti-counterfeiting, pp. 255\u2013268. Springer (2008)"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11605805_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 115\u2013131. Springer, Heidelberg (2006)"},{"issue":"2","key":"3_CR10","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1049\/iet-ifs.2009.0032","volume":"4","author":"P. Bulens","year":"2010","unstructured":"Bulens, P., Standaert, F.-X., Quisquater, J.-J.: How to Strongly Link Data and its Medium: the Paper Case. IET Information Security\u00a04(2), 125\u2013136 (2010)","journal-title":"IET Information Security"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Kirovski, D.: Anti-counterfeiting: Mixing the physical and the digital world. In: Guajardo, J., Preneel, B., Sadeghi, A.-R., Tuyls, P. (eds.) Foundations for Forgery-Resilient Cryptographic Hardware, vol. 09282 in Dagstuhl Seminar Proceedings (2010)","DOI":"10.1007\/978-3-642-14452-3_10"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Buchanan, J.D.R., Cowburn, R.P., Jausovec, A.V., Petit, D., Seem, P., Xiong, G., Atkinson, D., Fenton, K., Allwood, D.A., Bryan, M.T.: Fingerprinting documents and packaging. Nature, 475 (2005)","DOI":"10.1038\/436475a"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Kirovski, D.: Toward an automated verification of certificates of authenticity. In: Proceedings of the 5th ACM Conference on Electronic Commerce, EC 2004, pp. 160\u2013169. ACM (2004)","DOI":"10.1145\/988772.988797"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1120680.1120685","volume":"5","author":"Y. Chen","year":"2005","unstructured":"Chen, Y., Mih\u00e7ak, K., Kirovski, D.: Certifying authenticity via fiber-infused paper. SIGecom Exch.\u00a05, 29\u201337 (2005)","journal-title":"SIGecom Exch."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Chong, C.N., Jiang, D.: Anti-counterfeiting using phosphor puf. In: International Conference on In Anti-Counterfeiting, pp. 59\u201362 (2008)","DOI":"10.1109\/IWASID.2008.4688338"},{"key":"3_CR16","unstructured":"Shariati, S., Standaert, F.-X., Jacques, L., Macq, B., Salhi, M.A., Antoine, P.: Random profiles of laser marks. In: WIC Symposium on Information Theory in the Benelux, pp. 27\u201334 (2010)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Maes, R., Sadeghi, A.R., Standaert, F.X., Wachsmann, C.: A formalization of the security features of physical functions. In: IEEE Symposium on Security and Privacy, pp. 397\u2013412 (2011)","DOI":"10.1109\/SP.2011.10"},{"key":"3_CR18","unstructured":"Bauder, D.W.: An anti-counterfeiting concept for currency systems. Technical Report PTK-11990, Sandia National Labs, Albuquerque, NM (1983)"},{"key":"3_CR19","unstructured":"Commission on\u00a0Engineering Committee\u00a0on Next-Generation Currency\u00a0Design and National Research\u00a0Council Technical\u00a0Systems. Counterfeit Deterrent Features for the Next-Generation Currency Design. The National Academies Press (1993)"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/11894063_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Schrijen, G.-J., \u0160kori\u0107, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-Proof Hardware from Protective Coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 369\u2013383. Springer, Heidelberg (2006)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security (November 2002)","DOI":"10.1145\/586131.586132"},{"issue":"10","key":"3_CR22","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D. Lim","year":"2005","unstructured":"Lim, D., Lee, J.W., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems\u00a013(10), 1200\u20131205 (2005)","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"3_CR23","unstructured":"Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: VLSI Circuits. Digest of Technical Papers, pp. 176\u2013179 (2004)"},{"key":"3_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J. Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 63\u201380. Springer, Heidelberg (2007)"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Shariati, S., Jacques, L., Standaert, F.-X., Macq, B., Salhi, M.A., Antoine, P.: Randomly driven fuzzy key extraction of uncloneable images. In: International Conference on Image Processing, ICIP (2010)","DOI":"10.1109\/ICIP.2010.5652420"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Tuyls, P., Skoric, B.: Secret key generation from classical physics. Philips Research Book Series (2005)","DOI":"10.1007\/1-4020-4198-5_20"},{"key":"3_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/11496137_28","volume-title":"Applied Cryptography and Network Security","author":"B. \u0160kori\u0107","year":"2005","unstructured":"\u0160kori\u0107, B., Tuyls, P., Ophey, W.: Robust Key Extraction from Physical Uncloneable Functions. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 407\u2013422. Springer, Heidelberg (2005)"},{"issue":"10","key":"3_CR28","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D. Lim","year":"2005","unstructured":"Lim, D., Lee, J.W., Gassend, B., Edward Suh, G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Transactions on VLSI Systems\u00a013(10), 1200\u20131205 (2005)","journal-title":"IEEE Transactions on VLSI Systems"},{"key":"3_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/978-3-642-10366-7_40","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"F. Armknecht","year":"2009","unstructured":"Armknecht, F., Maes, R., Sadeghi, A.R., Sunar, B., Tuyls, P.: Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 685\u2013702. Springer, Heidelberg (2009)"},{"key":"3_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman and Hall\/CRC Press (2008)","DOI":"10.1201\/9781420010756"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32805-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T21:45:25Z","timestamp":1744062325000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32805-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642328046","9783642328053"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32805-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}