{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:24:31Z","timestamp":1743085471161,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_29","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"377-388","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SPIC - SRAM PUF Intergrated Chip Based Software Licensing Model"],"prefix":"10.1007","author":[{"given":"Vyshak","family":"Suresh","sequence":"first","affiliation":[]},{"given":"R.","family":"Manimegalai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Atallah, M.J., Bryant, E.D., Korb, J.T., Rice, J.R.: Binding software to specific native hardware in a VM environment: the PUF challenge and opportunity. In: Proceedings of the 1st ACM Workshop on Virtual Machine Security, pp. 45\u201348. ACM (2008)","DOI":"10.1145\/1456482.1456490"},{"key":"29_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5040-5","volume-title":"Physical Unclonable Functions in Theory and Practice","author":"C B\u00f6hm","year":"2012","unstructured":"B\u00f6hm, C., Hofer, M.: Physical Unclonable Functions in Theory and Practice. Springer, New York (2012). \n                  https:\/\/doi.org\/10.1007\/978-1-4614-5040-5"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Chen, B., Ignatenko, T., Willems, F., Maes, R., van der Sluis, E., Selimis, G.: A robust SRAM-PUF key generation scheme based on polar codes (2017)","DOI":"10.1109\/GLOCOM.2017.8254007"},{"key":"29_CR4","unstructured":"Chen, B., Ignatenko, T., Willems, F.M., Maes, R., van der Sluis, E., Selimis, G.: High-rate error correction schemes for SRAM-PUFs based on polar codes. arXiv preprint \n                  arXiv:1701.07320\n                  \n                 (2017)"},{"issue":"6","key":"29_CR5","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1109\/TCAD.2014.2370531","volume":"34","author":"J Delvaux","year":"2015","unstructured":"Delvaux, J., Gu, D., Schellekens, D., Verbauwhede, I.: Helper data algorithms for puf-based key generation: overview and analysis. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6), 889\u2013902 (2015)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-319-04852-9_6","volume-title":"Topics in Cryptology \u2013 CT-RSA 2014","author":"J Delvaux","year":"2014","unstructured":"Delvaux, J., Verbauwhede, I.: Attacking PUF-based pattern matching key generators via helper data manipulation. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 106\u2013131. Springer, Cham (2014). \n                  https:\/\/doi.org\/10.1007\/978-3-319-04852-9_6"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Delvaux, J., Verbauwhede, I.: Key-recovery attacks on various RO PUF constructions via helper data manipulation. In: Proceedings of the conference on Design, Automation & Test in Europe, p. 72. European Design and Automation Association (2014)","DOI":"10.7873\/DATE.2014.085"},{"key":"29_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63\u201380. Springer, Heidelberg (2007). \n                  https:\/\/doi.org\/10.1007\/978-3-540-74735-2_5"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: Physical unclonable functions and public-key crypto for FPGA IP protection. In: International Conference on Field Programmable Logic and Applications, FPL 2007, pp. 189\u2013195. IEEE (2007)","DOI":"10.1109\/FPL.2007.4380646"},{"key":"29_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-3-642-15031-9_23","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"M Hofer","year":"2010","unstructured":"Hofer, M., Boehm, C.: An alternative to error correction for SRAM-Like PUFs. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 335\u2013350. Springer, Heidelberg (2010). \n                  https:\/\/doi.org\/10.1007\/978-3-642-15031-9_23"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Hori, Y., Yoshida, T., Katashita, T., Satoh, A.: Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs. In: 2010 International Conference on Reconfigurable Computing and FPGAs (ReConFig), pp. 298\u2013303. IEEE (2010)","DOI":"10.1109\/ReConFig.2010.24"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Idriss, T., Idriss, H., Bayoumi, M.: A puf-based paradigm for IoT security. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 700\u2013705. IEEE (2016)","DOI":"10.1109\/WF-IoT.2016.7845456"},{"key":"29_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41395-7","volume-title":"Physically Unclonable Functions: Constructions, Properties and Applications","author":"R Maes","year":"2013","unstructured":"Maes, R.: Physically Unclonable Functions: Constructions, Properties and Applications. Springer, Heidelberg (2013). \n                  https:\/\/doi.org\/10.1007\/978-3-642-41395-7"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Maes, R., van der Leest, V.: Countering the effects of silicon aging on SRAM PUFs. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 148\u2013153. IEEE (2014)","DOI":"10.1109\/HST.2014.6855586"},{"key":"29_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/978-3-662-48324-4_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"R Maes","year":"2015","unstructured":"Maes, R., van der Leest, V., van der Sluis, E., Willems, F.: Secure key generation from biased PUFs. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 517\u2013534. Springer, Heidelberg (2015). \n                  https:\/\/doi.org\/10.1007\/978-3-662-48324-4_26"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Maiti, A., Schaumont, P.: Improving the quality of a physical unclonable function using configurable ring oscillators. In: International Conference on Field Programmable Logic and Applications, FPL 2009, pp. 703\u2013707. IEEE (2009)","DOI":"10.1109\/FPL.2009.5272361"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Mills, A., Vyas, S., Patterson, M., Sabotta, C., Jones, P., Zambreno, J.: Design and evaluation of a delay-based FPGA physically unclonable function. In: 2012 IEEE 30th International Conference on Computer Design (ICCD), pp. 143\u2013146. IEEE (2012)","DOI":"10.1109\/ICCD.2012.6378632"},{"key":"29_CR18","unstructured":"Puchinger, S., M\u00fcelich, S., Bossert, M., Hiller, M., Sigl, G.: On error correction for physical unclonable functions. In: Proceedings of 10th International ITG Conference on Systems, Communications and Coding, SCC 2015, pp. 1\u20136. VDE (2015)"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Yu, M.D., Sowell, R., Singh, A., M\u2019Ra\u00efhi, D., Devadas, S.: Performance metrics and empirical results of a PUF cryptographic key generation ASIC. In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 108\u2013115. IEEE (2012)","DOI":"10.1109\/HST.2012.6224329"},{"key":"29_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-642-23951-9_24","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"M-DM Yu","year":"2011","unstructured":"Yu, M.-D.M., M\u2019Raihi, D., Sowell, R., Devadas, S.: Lightweight and secure PUF key storage using limits of machine learning. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 358\u2013373. Springer, Heidelberg (2011). \n                  https:\/\/doi.org\/10.1007\/978-3-642-23951-9_24"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:52:29Z","timestamp":1558396349000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}