{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T21:29:30Z","timestamp":1762896570423,"version":"3.40.3"},"publisher-location":"Wiesbaden","reference-count":14,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658067076"},{"type":"electronic","value":"9783658067083"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-658-06708-3_15","type":"book-chapter","created":{"date-parts":[[2014,10,17]],"date-time":"2014-10-17T06:50:27Z","timestamp":1413528627000},"page":"188-198","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Hardware Intrinsic Security to Protect Value in the Mobile Market"],"prefix":"10.1007","author":[{"given":"Vincent","family":"van der Leest","sequence":"first","affiliation":[]},{"given":"Roel","family":"Maes","sequence":"additional","affiliation":[]},{"given":"Geert-Jan","family":"Schrijen","sequence":"additional","affiliation":[]},{"given":"Pim","family":"Tuyls","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,18]]},"reference":[{"key":"15_CR23","unstructured":"[Flyl14] Flylogic, \u201cFlylogic Blog,\u201d http:\/\/www.flylogic.net\/blog."},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"[GCDD02] B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, \u201cSilicon physical random functions,\u201d in ACM Conference on Computer and Communications Security (CCS\u201902). New York, NY, USA: ACM, 2002, pp.148\u2013160.","DOI":"10.1145\/586110.586132"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"[GKST07] J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, \u201cFPGA intrinsic PUFs and their use for IP protection,\u201d in Workshop on Cryptographic Hardware and Embedded Systems (CHES \u201907), ser. LNCS, vol. 4727, Berlin, Heidelberg: Springer-Verlag, 2007, pp. 63\u201380.","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"15_CR26","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-3-642-41395-7_2","volume-title":"Physically Unclonable Functions","author":"Roel Maes","year":"2013","unstructured":"[Maes13] R. Maes, \u201cPhysically Unclonable Functions \u2013 Constructions, Properties and Applications\u201d, Springer 2013, ISBN 978-3-642-41394-0, pp. 1-172"},{"key":"15_CR27","unstructured":"[MaTV08] R. Maes, P. Tuyls, and I. Verbauwhede, \u201cIntrinsic PUFs from flip-flops on reconfigurable devices,\u201d in Workshop on Information and System Security (WISSec 2008), Eindhoven, NL, 2008, p. 17."},{"key":"15_CR28","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/978-3-642-33027-8_17","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"Stefan Katzenbeisser","year":"2012","unstructured":"[KKRS12] S. Katzenbeisser, U. Kocabas\u00b8, V. Rozic, A.-R. Sadeghi, I. Verbauwhede, and C. Wachsmann, \u201cPUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon,\u201d in Cryptographic Hardware and Embedded Systems (CHES) 2012, ser. Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2012, vol. 7428, pp. 283\u2013301."},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"[BhCM12] M. Bhargava, C. Cakir, and K. Mai, \u201cComparison of bi-stable and delay-based Physical Unclonable Functions from measurements in 65nm bulk CMOS,\u201d in Custom Integrated Circuits Conference (CICC), 2012 IEEE, 2012, pp. 1\u20134.","DOI":"10.1109\/CICC.2012.6330625"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"[ScLe12] G.-J. Schrijen and V. van der Leest, \u201cComparative analysis of SRAM memories used as PUF primitives,\u201d in Design, Automation Test in Europe Conference Exhibition (DATE) 2012, march 2012, pp. 1319 \u20131324.","DOI":"10.1109\/DATE.2012.6176696"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"[LiTu03] J.-P. Linnartz and P. Tuyls, \u201cNew shielding functions to enhance privacy and prevent misuse of biometric templates,\u201d in Audio- and Video- Based Biometric Person Authentication, ser. Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2003, vol. 2688, pp. 393\u2013402.","DOI":"10.1007\/3-540-44887-X_47"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"[DoRS04] Y. Dodis, L. Reyzin, and A. Smith, \u201cFuzzy extractors: How to generate strong keys from biometrics and other noisy data,\u201d in Advances in Cryptology \u2013 EUROCRYPT 2004, ser. Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2004, vol. 3027, pp. 523\u2013540.","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"[HBNS13] C. Helfmeier, C. Boit, D. Nedospasov, and J.-P. Seifert, \u201cCloning physically unclonable functions,\u201d in Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on, 2013, pp. 1\u20136.","DOI":"10.1109\/HST.2013.6581556"},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"[NSHB13] D. Nedospasov, J.-P. Seifert, C. Helfmeier, and C. Boit, \u201cInvasive PUF analysis,\u201d in Fault Diagnosis and Tolerance in Cryptography (FDTC), 2013 Workshop on, 2013, pp. 30\u201338.","DOI":"10.1109\/FDTC.2013.19"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"[ZZHQ14] S. Zhao, Q. Zhang, G. Hu, Y. Qin, and D. Feng, \u201cProviding Root of Trust for ARM TrustZone using SRAM PUFs,\u201d in Cryptology ePrint Archive: Report 2014\/464, 2014. http:\/\/eprint.iacr.org\/2014\/464","DOI":"10.1145\/2666141.2666145"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"[SALK14] A. Schaller, T. Arul, V. van der Leest, and S. Katzenbeisser, \u201eLightweight Anti-Counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs \u201e, to be published at 7th International Conference on Trust & Trustworthy Computing (TRUST) 2014.","DOI":"10.1007\/978-3-319-08593-7_6"}],"container-title":["ISSE 2014 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-06708-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T15:13:20Z","timestamp":1676906000000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-06708-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783658067076","9783658067083"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-06708-3_15","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}