{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:01:25Z","timestamp":1773511285830,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642387081","type":"print"},{"value":"9783642387098","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44709-3_26","type":"book-chapter","created":{"date-parts":[[2014,9,12]],"date-time":"2014-09-12T11:03:00Z","timestamp":1410519780000},"page":"476-492","source":"Crossref","is-referenced-by-count":92,"title":["Efficient Power and Timing Side Channels for Physical Unclonable Functions"],"prefix":"10.1007","author":[{"given":"Ulrich","family":"R\u00fchrmair","sequence":"first","affiliation":[]},{"given":"Xiaolin","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jan","family":"S\u00f6lter","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Mahmoud","sequence":"additional","affiliation":[]},{"given":"Mehrdad","family":"Majzoobi","sequence":"additional","affiliation":[]},{"given":"Farinaz","family":"Koushanfar","sequence":"additional","affiliation":[]},{"given":"Wayne","family":"Burleson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","volume-title":"Pattern recognition and machine learning","author":"C.M. Bishop","year":"2006","unstructured":"Bishop, C.M., Nasrabadi, N.M.: Pattern recognition and machine learning. Springer, New York (2006)"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Delvaux, J., Verbauwhede, I.: Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise. In: HOST (2013)","DOI":"10.1109\/HST.2013.6581579"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Delvaux, J., Verbauwhede, I.: Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation. IACR Cryptology ePrint Archive, Report 2013\/566","DOI":"10.1007\/978-3-319-04852-9_6"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Delvaux, J., Verbauwhede, I.: Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation. IACR Cryptology ePrint Archive, Report 2013\/610","DOI":"10.7873\/DATE2014.085"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Delvaux, J., Verbauwhede, I.: Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes. IACR Cryptology ePrint Archive, Report 2013\/619","DOI":"10.1109\/TCSI.2013.2290845"},{"key":"26_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-04138-9_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"S. Devadas","year":"2009","unstructured":"Devadas, S.: Physical unclonable functions and secure processors. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 65\u201365. Springer, Heidelberg (2009)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security, pp. 148\u2013160 (2002)","DOI":"10.1145\/586131.586132"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Helfmeier, C., Nedospasov, D., Boit, C., Seifert, J.-P.: Cloning Physically Unclonable Functions. In: HOST 2013 (2013)","DOI":"10.1109\/HST.2013.6581556"},{"key":"26_CR9","unstructured":"Lim, D.: Extracting Secret Keys from Integrated Circuits. MSc Thesis, MIT (2004)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Devadas, S.: FPGA PUF using programmable delay lines. In: IEEE Workshop Information Forensics and Security, WIFS (2010)","DOI":"10.1109\/WIFS.2010.5711471"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Lightweight Secure PUFs. In: ICCAD, pp. 607\u2013673 (2008)","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Testing techniques for hardware security. In: Proceedings of the International Test Conference (ITC), pp. 1\u201310 (2008)","DOI":"10.1109\/TEST.2008.4700636"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Techniques for Design and Implementation of Secure Reconfigurable PUFs. ACM Trans. Reconfigurable Technology and Systems\u00a02(1) (2009)","DOI":"10.1145\/1502781.1502786"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Dyer, E., Elnably, A., Koushanfar, F.: Rapid FPGA Characterization using Clock Synthesis and Signal Sparsity. In: International Test Conference (ITC), pp. 1\u201310 (2010)","DOI":"10.1109\/TEST.2010.5699248"},{"issue":"3","key":"26_CR15","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/TIFS.2011.2131133","volume":"6","author":"M. Majzoobi","year":"2011","unstructured":"Majzoobi, M., Koushanfar, F.: Time-Bounded Authentication of FPGAs. IEEE Transactions on Information Forensics and Security (TIFS)\u00a06(3), 1123\u20131135 (2011)","journal-title":"IEEE Transactions on Information Forensics and Security (TIFS)"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Rostami, M., Majzoobi, M., Koushanfar, F., Wallach, D., Devadas, S.: Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching. IEEE Transactions on Emerging Topics in Computing (2014)","DOI":"10.1109\/TETC.2014.2300635"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-21599-5_3","volume-title":"Trust and Trustworthy Computing","author":"D. Merli","year":"2011","unstructured":"Merli, D., Schuster, D., Stumpf, F., Sigl, G.: Side-Channel Analysis of PUFs and Fuzzy Extractors. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol.\u00a06740, pp. 33\u201347. Springer, Heidelberg (2011)"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Merli, D., Schuster, D., Stumpf, F., Sigl, G.: Semi-invasive EM attack on FPGA RO PUFs and countermeasures. In: ACM Workshop on Embedded Systems Security, WESS 2011 (2011)","DOI":"10.1145\/2072274.2072276"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Merli, D., Heyszl, J., Heinz, B., Schuster, D., Stumpf, F., Sigl, G.: Localized electromagnetic analysis of RO PUFs. In: HOST 2013 (2013)","DOI":"10.1109\/HST.2013.6581559"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Nedospasov, D., Helfmeier, C., Seifert, J.-P., Boit, C.: Invasive PUF Analysis. In: Fault Diagnonsis and Tolerance in Cryptography, FDTC 2013 (2013)","DOI":"10.1109\/FDTC.2013.19"},{"key":"26_CR21","unstructured":"Pappu, R.: Physical One-Way Functions. PhD Thesis, Massachusetts Institute of Technology (2001)"},{"key":"26_CR22","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R. Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-Way Functions. Science\u00a0297, 2026\u20132030 (2002)","journal-title":"Science"},{"key":"26_CR23","unstructured":"Riedmiller, M., Braun, H.: A direct adaptive method for faster backpropagation learning: The RPROP algorithm. In: IEEE International Conference on Neural Networks, pp. 586\u2013591 (1993)"},{"key":"26_CR24","volume-title":"Introduction to Hardware Security and Trust","author":"U. R\u00fchrmair","year":"2011","unstructured":"R\u00fchrmair, U., Devadas, S., Koushanfar, F.: Security based on Physical Unclonability and Disorder. In: Tehranipoor, M., Wang, C. (eds.) Introduction to Hardware Security and Trust, Springer, Heidelberg (2011)"},{"key":"26_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-642-33027-8_15","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"U. R\u00fchrmair","year":"2012","unstructured":"R\u00fchrmair, U., van Dijk, M.: Practical security analysis of PUF-based two-player protocols. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol.\u00a07428, pp. 251\u2013267. Springer, Heidelberg (2012)"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., van Dijk, M.: PUFs in Security Protocols: Attack Models and Security Evaluations. In: IEEE Symposium on Security and Privacy, Oakland 2013 (2013)","DOI":"10.1109\/SP.2013.27"},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Holcomb, D.E.: PUFs at a glance. In: DATE 2014, pp. 1\u20136 (2014)","DOI":"10.7873\/DATE2014.360"},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling Attacks on Physical Unclonable Functions. In: ACM Conference on Computer and Communications Security (2010)","DOI":"10.1145\/1866307.1866335"},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., S\u00f6lter, J., Sehnke, F.: On the Foundations of Physical Unclonable Functions. Cryptology e-Print Archive (June 2009)","DOI":"10.1145\/1866307.1866335"},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., S\u00f6lter, J., Sehnke, F., Xu, X., Mahmoud, A., Stoyanova, V., Dror, G., Schmidhuber, J., Burleson, W., Devadas, S.: PUF Modeling Attacks on Simulated and Silicon Data. IEEE Transactions on Information Forensics and Security, IEEE T-IFS (2013)","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"26_CR31","doi-asserted-by":"crossref","unstructured":"Edward Suh, G.: Physical Unclonable Functions for Device Authentication and Secret Key Generation. In: DAC 2007, pp. 9\u201314 (2007)","DOI":"10.1109\/DAC.2007.375043"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44709-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T14:30:57Z","timestamp":1689517857000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44709-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642387081","9783642387098"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44709-3_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}