{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T10:12:34Z","timestamp":1766139154806,"version":"3.41.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T00:00:00Z","timestamp":1744416000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T00:00:00Z","timestamp":1744416000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["RS-2024-00449412"],"award-info":[{"award-number":["RS-2024-00449412"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10207-025-01031-1","type":"journal-article","created":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T00:47:31Z","timestamp":1744418851000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Impact of temperature fluctuations on SRAM- based physically unclonable functions"],"prefix":"10.1007","volume":"24","author":[{"given":"Moon-Seok","family":"Kim","sequence":"first","affiliation":[]},{"given":"Sang-Kyung","family":"Yoo","sequence":"additional","affiliation":[]},{"given":"Junki","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Sungho","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,12]]},"reference":[{"issue":"10","key":"1031_CR1","doi-asserted-by":"publisher","first-page":"10250","DOI":"10.1109\/JIOT.2020.2997651","volume":"7","author":"W Iqbal","year":"2020","unstructured":"Iqbal, W., Abbas, H., Daneshmand, M., Rauf, B., Bangash, Y.A.: An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J. 7(10), 10250\u201310276 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2997651","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"1031_CR2","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/COMST.2016.2618874","volume":"19","author":"DB Rawat","year":"2016","unstructured":"Rawat, D.B., Reddy, S.R.: Software defined networking architecture, security and energy efficiency: A survey. IEEE Commun. Surv. Tutor. 19(1), 325\u2013346 (2016). https:\/\/doi.org\/10.1109\/COMST.2016.2618874","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1031_CR3","doi-asserted-by":"publisher","unstructured":"Potlapally, N.: Hardware security in practice: Challenges and opportunities, in Proc. IEEE-HOST, San Diego, CA, USA, (2011). https:\/\/doi.org\/10.1109\/HST.2011.5955003","DOI":"10.1109\/HST.2011.5955003"},{"issue":"1","key":"1031_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TVLSI.2021.3073946","volume":"30","author":"M Nagata","year":"2021","unstructured":"Nagata, M., Miki, T., Miura, N.: Physical attack protection techniques for IC chip level hardware security. IEEE Trans. Very Large Scale Integr. Syst. 30(1), 5\u201314 (2021). https:\/\/doi.org\/10.1109\/TVLSI.2021.3073946","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"issue":"6","key":"1031_CR5","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/TCAD.2020.3047976","volume":"40","author":"W Hu","year":"2020","unstructured":"Hu, W., Chang, C.H., Sengupta, A., Bhunia, S., Kastner, R., Li, H.: An overview of hardware security and trust: Threats, countermeasures, and design tools. IEEE Trans. Comput. -Aided Des. Integr. Circuits Syst. 40(6), 1010\u20131038 (2020). https:\/\/doi.org\/10.1109\/TCAD.2020.3047976","journal-title":"IEEE Trans. Comput. -Aided Des. Integr. Circuits Syst."},{"key":"1031_CR6","doi-asserted-by":"publisher","unstructured":"Shamsoshoara, A., Korenda, A., Afghah, F., Zeadally, S.: A survey on physical unclonable function (PUF)-based security solutions for Internet of Things, Comput. Netw. 183, Art. 107593, (2020). https:\/\/doi.org\/10.1016\/j.comnet.2020.107593","DOI":"10.1016\/j.comnet.2020.107593"},{"issue":"3","key":"1031_CR7","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1109\/TVLSI.2016.2606658","volume":"25","author":"F Tehranipoor","year":"2016","unstructured":"Tehranipoor, F., Karimian, N., Yan, W., Chandy, J.A.: DRAM-based intrinsic physically unclonable functions for system-level security and authentication. IEEE Trans. Very Large Scale Integr. Syst. 25(3), 1085\u20131097 (2016). https:\/\/doi.org\/10.1109\/TVLSI.2016.2606658","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"issue":"2","key":"1031_CR8","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1038\/s41928-020-0372-5","volume":"3","author":"Y Gao","year":"2020","unstructured":"Gao, Y., Al-Sarawi, S.F., Abbott, D.: Physical unclonable functions. Nat. Electron. 3(2), 81\u201391 (2020). https:\/\/doi.org\/10.1038\/s41928-020-0372-5","journal-title":"Nat. Electron."},{"key":"1031_CR9","doi-asserted-by":"publisher","unstructured":"Al-Meer, A., Al-Kuwari, S.: Physical unclonable functions (PUF) for IoT devices, ACM Comput. Surv. 55(14s), Art. 314, (2023). https:\/\/doi.org\/10.1145\/3591464","DOI":"10.1145\/3591464"},{"issue":"2","key":"1031_CR10","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TNANO.2015.2397956","volume":"14","author":"MS Kim","year":"2015","unstructured":"Kim, M.S., Moon, D.I., Yoo, S.K., Lee, S.H., Choi, Y.K.: Investigation of physically unclonable functions using flash memory for integrated circuit authentication. IEEE Trans. Nanotechnol. 14(2), 384\u2013389 (2015). https:\/\/doi.org\/10.1109\/TNANO.2015.2397956","journal-title":"IEEE Trans. Nanotechnol"},{"key":"1031_CR11","doi-asserted-by":"publisher","unstructured":"Katzenbeisser, S., Kocaba\u015f, \u00dc., Ro\u017ei\u0107, V., Sadeghi, A.R., Verbauwhede, I., Wachsmann, C.: PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon, in Proc. CHES, Leuven, Belgium, pp. 283\u2013301, (2012). https:\/\/doi.org\/10.1007\/978-3-642-33027-8_17","DOI":"10.1007\/978-3-642-33027-8_17"},{"key":"1031_CR12","doi-asserted-by":"publisher","unstructured":"Puttananjegowda, K., Thomas, S.: A detailed review on physical unclonable function circuits for hardware security, in Proc. IEEE-IEMCON, Vancouver, BC, Canada, (2018). https:\/\/doi.org\/10.1109\/IEMCON.2018.8615074","DOI":"10.1109\/IEMCON.2018.8615074"},{"issue":"5","key":"1031_CR13","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.1007\/s10207-023-00668-0","volume":"22","author":"MS Kim","year":"2023","unstructured":"Kim, M.S., Kim, S., Yoo, S.K., Lee, B.S., Yu, J.M., Tcho, I.W., Choi, Y.K.: Error reduction of SRAM-based physically unclonable function for chip authentication. Int. J. Inf. Secur. 22(5), 1087\u20131098 (2023). https:\/\/doi.org\/10.1007\/s10207-023-00668-0","journal-title":"Int. J. Inf. Secur."},{"key":"1031_CR14","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.vlsi.2019.06.001","volume":"68","author":"MS Mispan","year":"2019","unstructured":"Mispan, M.S., Duan, S., Halak, B., Zwolinski, M.: A reliable PUF in a dual function SRAM. Integration. 68, 12\u201321 (2019). https:\/\/doi.org\/10.1016\/j.vlsi.2019.06.001","journal-title":"Integration"},{"key":"1031_CR15","doi-asserted-by":"publisher","unstructured":"Chen, B., Ignatenko, T., Willems, F.M.J., Maes, R., Sluis, E., Selimis, G.: A robust SRAM-PUF key generation scheme based on polar codes, in Proc. GLOBECOM, Singapore, (2017). https:\/\/doi.org\/10.1109\/GLOCOM.2017.8254007","DOI":"10.1109\/GLOCOM.2017.8254007"},{"issue":"7","key":"1031_CR16","doi-asserted-by":"publisher","first-page":"3493","DOI":"10.1109\/TCSII.2024.3359777","volume":"71","author":"S Park","year":"2024","unstructured":"Park, S., Jeong, M., Kim, J., Kim, D., Lee, Y.: A 6T-SRAM-Based Physically-Unclonable-Function with low BER through automated maximum Nismatch detection. IEEE Trans. Circuits Syst. II Express Briefs. 71(7), 3493\u20133497 (2024). https:\/\/doi.org\/10.1109\/TCSII.2024.3359777","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"issue":"4","key":"1031_CR17","doi-asserted-by":"publisher","first-page":"2339","DOI":"10.1109\/TCSII.2023.3339296","volume":"71","author":"L Ni","year":"2023","unstructured":"Ni, L., Wang, P., Zhang, Y., Li, X., Li, G., Ding, L.: Si PUF: An SRAM and inverter based PUF with a bit error rate of 0.0053% and 0.073\/0.042 pJ\/bit. IEEE Trans. Circuits Syst. II Express Briefs. 71(4), 2339\u20132343 (2023). https:\/\/doi.org\/10.1109\/TCSII.2023.3339296","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"issue":"3","key":"1031_CR18","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/TNS.2021.3126587","volume":"69","author":"Z Su","year":"2022","unstructured":"Su, Z., Li, B., Zhang, W., Gao, J., Su, X., Zhang, G.: Reliability improvement on SRAM physical unclonable function (PUF) using an 8T cell in 28 Nm FDSOI. IEEE Trans. Nucl. Sci. 69(3), 333\u2013339 (2022). https:\/\/doi.org\/10.1109\/TNS.2021.3126587","journal-title":"IEEE Trans. Nucl. Sci."},{"key":"1031_CR19","doi-asserted-by":"publisher","unstructured":"Streit, F.J., Kr\u00fcger, P., Becher, A., Wildermann, S., Teich, J.: Design and evaluation of a tunable PUF architecture for FPGAs, ACM Trans. Reconfigurable Technol. Syst. 15(1) Art. 7, (2021). https:\/\/doi.org\/10.1145\/349123","DOI":"10.1145\/349123"},{"issue":"4","key":"1031_CR20","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1049\/iet-cds.2019.0175","volume":"14","author":"H Ning","year":"2020","unstructured":"Ning, H., Farha, F., Ullah, A., Mao, L.: Physical unclonable function: Architectures, applications and challenges for dependable security. IET Circuits Devices Syst. 14(4), 407\u2013424 (2020). https:\/\/doi.org\/10.1049\/iet-cds.2019.0175","journal-title":"IET Circuits Devices Syst."},{"key":"1031_CR21","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/s41635-019-00080-y","volume":"3","author":"I Karageorgos","year":"2019","unstructured":"Karageorgos, I., Isgenc, M.M., Pagliarini, S., Pileggi, L.: Chip-to-chip authentication method based on SRAM PUF and public key cryptography. J. Hardw. Syst. Secur. 3, 382\u2013396 (2019). https:\/\/doi.org\/10.1007\/s41635-019-00080-y","journal-title":"J. Hardw. Syst. Secur."},{"key":"1031_CR22","doi-asserted-by":"publisher","unstructured":"Koeberl, P., Li, J., Rajan, A., Vishik, C., Wu, W.: A practical device authentication scheme using SRAM PUFs, in Proc. TRUST, Pittsburgh, PA, USA, pp. 63\u201377, (2011). https:\/\/doi.org\/10.1007\/978-3-642-21599-5_5","DOI":"10.1007\/978-3-642-21599-5_5"},{"key":"1031_CR23","unstructured":"Integrated Silicon Solution Inc.: IS61WV51216EDALL Rev. B1, (2020). https:\/\/doi.org\/www.datasheet.co.kr\/PDF\/1013809\/IS61WV51216EDALL.pdf"},{"key":"1031_CR24","unstructured":"Renesas: 71256SA, (2020). https:\/\/datasheet4u.com\/pdf-down\/7\/1\/2\/71256SA-Renesas.pdf"},{"key":"1031_CR25","unstructured":"Chip plus: CS18LV02565 Rev. 2.0, (2004). https:\/\/doi.org\/www.datasheet.co.kr\/PDF\/516359\/CS18LV02565.pdf"},{"key":"1031_CR26","unstructured":"XGecu: Xgpro software user guide. http:\/\/www.xgecu.com"},{"key":"1031_CR27","volume-title":"LTspice\u00ae for Linear Circuits","author":"JA Svoboda","year":"2023","unstructured":"Svoboda, J.A.: LTspice\u00ae for Linear Circuits. Wiley, Hoboken, NJ, USA (2023)"},{"issue":"2","key":"1031_CR28","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1109\/TC.2018.2866241","volume":"68","author":"C Gu","year":"2018","unstructured":"Gu, C., Liu, W., Hanley, N., Hesselbarth, R., O\u2019Neill, M.: A theoretical model to link uniqueness and min-entropy for PUF evaluations. IEEE Trans. Comput. 68(2), 287\u2013293 (2018). https:\/\/doi.org\/10.1109\/TC.2018.2866241","journal-title":"IEEE Trans. Comput."},{"key":"1031_CR29","doi-asserted-by":"publisher","first-page":"136792","DOI":"10.1109\/ACCESS.2021.3117240","volume":"9","author":"F Amsaad","year":"2021","unstructured":"Amsaad, F., Oun, A., Niamat, M.Y., Razaque, A., Kose, S., Mahmoud, M., Alasmary, W., Alsolami, F.: Enhancing the performance of lightweight configurable PUF for robust IoT hardware-assisted security. IEEE Access. 9, 136792\u2013136810 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3117240","journal-title":"IEEE Access."},{"key":"1031_CR30","doi-asserted-by":"publisher","unstructured":"Maes, R., Rozic, V., Verbauwhede, I., Koeberl, P., Van der Sluis, E., Van der Leest, V.: Experimental evaluation of physically unclonable functions in 65 nm CMOS, in Proc. IEEE-ESSCIRC, Bordeaux, France, pp. 486\u2013489, (2012). https:\/\/doi.org\/10.1109\/ESSCIRC.2012.6341361","DOI":"10.1109\/ESSCIRC.2012.6341361"},{"issue":"3","key":"1031_CR31","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s10836-022-06006-x","volume":"38","author":"W Wang","year":"2022","unstructured":"Wang, W., Singh, A.D., Guin, U.: A systematic bit selection method for robust SRAM PUFs. J. Electron. Test. 38(3), 235\u2013246 (2022). https:\/\/doi.org\/10.1007\/s10836-022-06006-x","journal-title":"J. Electron. Test."},{"key":"1031_CR32","doi-asserted-by":"publisher","unstructured":"Cortez, M., Dargar, A., Hamdioui, S., Schrijen, G.J.: Modeling SRAM start-up behavior for physical unclonable functions, in Proc. IEEE-DFT, Austin, TX, USA, (2012). https:\/\/doi.org\/10.1109\/DFT.2012.6378190","DOI":"10.1109\/DFT.2012.6378190"},{"issue":"3","key":"1031_CR33","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1109\/16.661230","volume":"45","author":"HS Momose","year":"1998","unstructured":"Momose, H.S., Nakamura, S.I., Ohguro, T., Yoshitomi, T., Morifuji, E., Morimoto, T., Katsumata, Y., Iwai, H.: Study of the manufacturing feasibility of 1.5-nm direct-tunneling gate oxide mosfets: Uniformity, reliability, and Dopant penetration of the gate oxide. IEEE Trans. Electron. Devices. 45(3), 691\u2013700 (1998). https:\/\/doi.org\/10.1109\/16.661230","journal-title":"IEEE Trans. Electron. Devices"},{"issue":"1","key":"1031_CR34","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/16.974757","volume":"49","author":"A Asenov","year":"2002","unstructured":"Asenov, A., Kaya, S., Davies, J.H.: Intrinsic threshold voltage fluctuations in Decanano mosfets due to local oxide thickness variations. IEEE Trans. Electron. Devices. 49(1), 112\u2013119 (2002). https:\/\/doi.org\/10.1109\/16.974757","journal-title":"IEEE Trans. Electron. Devices"},{"issue":"11","key":"1031_CR35","doi-asserted-by":"publisher","first-page":"2216","DOI":"10.1109\/16.333844","volume":"41","author":"T Mizuno","year":"1994","unstructured":"Mizuno, T., Okumtura, J., Toriumi, A.: Experimental study of threshold voltage fluctuation due to statistical variation of channel Dopant number in MOSFET\u2019s. IEEE Trans. Electron. Devices. 41(11), 2216\u20132221 (1994). https:\/\/doi.org\/10.1109\/16.333844","journal-title":"IEEE Trans. Electron. Devices"},{"key":"1031_CR36","doi-asserted-by":"publisher","unstructured":"L\u00fc, W., Sun, L.: Modeling of current mismatch induced by random dopant fluctuation in nano-MOSFETs, J Semicond. 32(8), 084003 (2011). https:\/\/doi.org\/10.1088\/1674-4926\/32\/8\/084003","DOI":"10.1088\/1674-4926\/32\/8\/084003"},{"key":"1031_CR37","doi-asserted-by":"publisher","unstructured":"Consentino, G.: Power MOSFETs working in linear zone: The dangerous effect of the K gain factor on thermal instability, in Proc. IEEE-SPEEDAM, Sorrento, Italy, pp. 1515\u20131519, (2012). https:\/\/doi.org\/10.1109\/SPEEDAM.2012.6264522","DOI":"10.1109\/SPEEDAM.2012.6264522"},{"issue":"7","key":"1031_CR38","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1016\/j.sse.2005.04.004","volume":"49","author":"V d\u2019Alessandro","year":"2005","unstructured":"d\u2019Alessandro, V., Spirito, P.: Achieving accuracy in modeling the temperature coefficient of threshold voltage in MOS transistors with uniform and horizontally nonuniform channel doping. Solid State Electron. 49(7), 1098\u20131106 (2005). https:\/\/doi.org\/10.1016\/j.sse.2005.04.004","journal-title":"Solid State Electron."},{"key":"1031_CR39","unstructured":"Akter, S., Rahman, M.M., Samy, M.A.A.: Compact analytical modeling of surface potential of a fully depleted dual material double gate MOSFET. Mater. Mechatron. Syst. Eng. J., 1, 1, (2021)"},{"key":"1031_CR40","unstructured":"Weifeng, Y.: Semiconductor nanowires for future nanoscale application: Synthesis, characterization and nanoelectronic devices, Ph.D. dissertation, Natl. Univ. Singap., Singapore, (2009)"},{"issue":"4","key":"1031_CR41","doi-asserted-by":"publisher","first-page":"17","DOI":"10.9790\/4861-07411725","volume":"7","author":"RK Chanana","year":"2015","unstructured":"Chanana, R.K.: N-channel silicon MOSFET as a device to characterize MIS structures by the BOEMDET technique. IOSR-J Appl. Phys. 7(4), 17\u201325 (2015). https:\/\/doi.org\/10.9790\/4861-07411725","journal-title":"IOSR-J Appl. Phys."},{"key":"1031_CR42","first-page":"267","volume-title":"Solid State Electronic Devices","author":"BG Streetman","year":"2001","unstructured":"Streetman, B.G., Banerjee, S.K.: Field-effect transistors. in In: Solid State Electronic Devices, 5th edn., pp. 267\u2013277. Prentice-Hall, New Delhi, India (2001)","edition":"5"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01031-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01031-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01031-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:12:17Z","timestamp":1750500737000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01031-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,12]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1031"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01031-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,4,12]]},"assertion":[{"value":"12 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"113"}}