{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:30:36Z","timestamp":1764333036532,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T00:00:00Z","timestamp":1621296000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T00:00:00Z","timestamp":1621296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s10836-021-05946-0","type":"journal-article","created":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T05:03:11Z","timestamp":1621314191000},"page":"305-316","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Secure and Robust PUF-based Key Generation with Wiretap Polar Coset Codes"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4230-5243","authenticated-orcid":false,"given":"Yonghong","family":"Bai","sequence":"first","affiliation":[]},{"given":"Zhiyuan","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,18]]},"reference":[{"key":"5946_CR1","doi-asserted-by":"crossref","unstructured":"Gassend B, Clarke D, Van\u00a0Dijk M, Devadas S (2002) Silicon physical random functions. In: Proceedings of the 9th ACM conference on Computer and communications security, ACM, pp 148\u2013160","DOI":"10.1145\/586110.586132"},{"issue":"2","key":"5946_CR2","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s13389-016-0125-6","volume":"6","author":"R Maes","year":"2016","unstructured":"Maes R, van der Leest V, van der Sluis E, Willems F (2016) Secure key generation from biased pufs: extended version. J Cryptograph Eng 6(2):121\u2013137","journal-title":"J Cryptograph Eng"},{"key":"5946_CR3","doi-asserted-by":"crossref","unstructured":"Fuller B, Meng X, Reyzin L (2013) Computational fuzzy extractors. In: Part I of the Proceedings of the 19th International Conference on Advances in Cryptology-ASIACRYPT 2013-Volume 8269, pp 174\u2013193","DOI":"10.1007\/978-3-642-42033-7_10"},{"issue":"1","key":"5946_CR4","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TDSC.2016.2536609","volume":"14","author":"C Herder","year":"2016","unstructured":"Herder C, Ren L, Van Dijk M, Yu MD, Devadas S (2016) Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions. IEEE Trans Depend Sec Comput 14(1):65\u201382","journal-title":"IEEE Trans Depend Sec Comput"},{"key":"5946_CR5","doi-asserted-by":"crossref","unstructured":"Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Proceedings of the International Conference on Advances in Cryptology (EUROCRYPT 2004), Springer, pp 523\u2013540","DOI":"10.1007\/978-3-540-24676-3_31"},{"issue":"2","key":"5946_CR6","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TIFS.2010.2046984","volume":"5","author":"T Ignatenko","year":"2010","unstructured":"Ignatenko T, Willems FM (2010) Information leakage in fuzzy commitment schemes. IEEE Trans Info Foren Sec 5(2):337\u2013348","journal-title":"IEEE Trans Info Foren Sec"},{"issue":"1","key":"5946_CR7","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MDT.2010.25","volume":"27","author":"MD Yu","year":"2010","unstructured":"Yu MD, Devadas S (2010) Secure and robust error correction for physical unclonable functions. IEEE Des Test Comp 27(1):48\u201365","journal-title":"IEEE Des Test Comp"},{"key":"5946_CR8","doi-asserted-by":"crossref","unstructured":"Hiller M, Merli D, Stumpf F, Sigl G (2012) Complementary IBS: Application specific error correction for PUFs. In: Proceedings of the International Symposium on Hardware-Oriented Security and Trust, IEEE, pp 1\u20136","DOI":"10.1109\/HST.2012.6224310"},{"issue":"2","key":"5946_CR9","first-page":"616","volume":"66","author":"M Suzuki","year":"2018","unstructured":"Suzuki M, Ueno R, Homma N, Aoki T (2018) Efficient fuzzy extractors based on ternary debiasing method for biased physically unclonable functions. IEEE Trans Circ Syst: Regular Papers 66(2):616\u2013629","journal-title":"IEEE Trans Circ Syst: Regular Papers"},{"key":"5946_CR10","doi-asserted-by":"publisher","first-page":"86","DOI":"10.46586\/tches.v2020.i4.86-128","volume":"4","author":"R Ueno","year":"2020","unstructured":"Ueno R, Kazumori K (2020) Homma N (2020) Rejection sampling schemes for extracting uniform distribution from biased PUFs. IACR Trans Cryptograph Hardware Embed Syst 4:86\u2013128","journal-title":"IACR Trans Cryptograph Hardware Embed Syst"},{"issue":"7","key":"5946_CR11","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1109\/TC.2019.2897996","volume":"68","author":"R Ueno","year":"2019","unstructured":"Ueno R, Suzuki M, Homma N (2019) Tackling biased PUFs through biased masking: A debiasing method for efficient fuzzy extractor. IEEE Trans Comp 68(7):1091\u20131104","journal-title":"IEEE Trans Comp"},{"key":"5946_CR12","doi-asserted-by":"crossref","unstructured":"Hiller M, \u00d6nalan AG (2017) Hiding secrecy leakage in leaky helper data. In: Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems, Springer, pp 601\u2013619","DOI":"10.1007\/978-3-319-66787-4_29"},{"key":"5946_CR13","unstructured":"Gassend BL (2003) Physical random functions. Master\u2019s thesis, Massachusetts Institute of Technology, Boston, USA"},{"key":"5946_CR14","unstructured":"Kirkpatrick MS, Bertino E (2010) Software techniques to combat drift in PUF-based authentication systems. In: Proceedings of the Workshop on Secure Component and System Identification (SECSI 2010), pp 1\u20139"},{"key":"5946_CR15","doi-asserted-by":"crossref","unstructured":"Maes R, Van\u00a0Herrewege A, Verbauwhede I (2012) PUFKY: A fully functional PUF-based cryptographic key generator. In: Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Springer, pp 302\u2013319","DOI":"10.1007\/978-3-642-33027-8_18"},{"key":"5946_CR16","doi-asserted-by":"crossref","unstructured":"B\u00f6sch C, Guajardo J, Sadeghi AR, Shokrollahi J, Tuyls P (2008) Efficient helper data key extractor on FPGAs. In: Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Springer, pp 181\u2013197","DOI":"10.1007\/978-3-540-85053-3_12"},{"key":"5946_CR17","doi-asserted-by":"crossref","unstructured":"Maes R, Tuyls P, Verbauwhede I (2009a) Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs. In: Proceedings of the International Workshop on Cryptographic hardware and embedded systems, Springer, pp 332\u2013347","DOI":"10.1007\/978-3-642-04138-9_24"},{"key":"5946_CR18","doi-asserted-by":"crossref","unstructured":"Maes R, Tuyls P, Verbauwhede I (2009b) A soft decision helper data algorithm for SRAM PUFs. In: Proceedings of the international symposium on information theory, IEEE, pp 2101\u20132105","DOI":"10.1109\/ISIT.2009.5205263"},{"issue":"7","key":"5946_CR19","doi-asserted-by":"publisher","first-page":"3051","DOI":"10.1109\/TIT.2009.2021379","volume":"55","author":"E Arikan","year":"2009","unstructured":"Arikan E (2009) Channel polarization: a method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. IEEE Trans Info Theo 55(7):3051\u20133073","journal-title":"IEEE Trans Info Theo"},{"key":"5946_CR20","unstructured":"Samsung (2016) Discussion on polar codes for NR. TDoc R1-1612552, Reno, Nevada, US, 3GPP TSG RAN WG1 #87"},{"issue":"1","key":"5946_CR21","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1109\/JIOT.2018.2864594","volume":"6","author":"B Chen","year":"2018","unstructured":"Chen B, Willems FM (2018) Secret key generation over biased physical unclonable functions with polar codes. IEEE Intern Things J 6(1):435\u2013445","journal-title":"IEEE Intern Things J"},{"issue":"4","key":"5946_CR22","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1109\/TIFS.2009.2033228","volume":"4","author":"T Ignatenko","year":"2009","unstructured":"Ignatenko T, Willems FM (2009) Biometric systems: Privacy and secrecy aspects. IEEE Trans Info Foren Sec 4(4):956","journal-title":"IEEE Trans Info Foren Sec"},{"key":"5946_CR23","doi-asserted-by":"crossref","unstructured":"Koeberl P, Li J, Rajan A, Wu W (2014) Entropy loss in PUF-based key generation schemes: The repetition code pitfall. In: Proceedings of the International Symposium on Hardware-Oriented Security and Trust (HOST), IEEE, pp 44\u201349","DOI":"10.1109\/HST.2014.6855566"},{"issue":"10","key":"5946_CR24","doi-asserted-by":"publisher","first-page":"6428","DOI":"10.1109\/TIT.2011.2162275","volume":"57","author":"H Mahdavifar","year":"2011","unstructured":"Mahdavifar H, Vardy A (2011) Achieving the secrecy capacity of wiretap channels using polar codes. IEEE Trans Info Theo 57(10):6428\u20136443","journal-title":"IEEE Trans Info Theo"},{"key":"5946_CR25","unstructured":"Korada SB (2009) Polar codes for channel and source coding. PhD dissertation, Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"},{"issue":"8","key":"5946_CR26","doi-asserted-by":"publisher","first-page":"966","DOI":"10.1002\/sec.230","volume":"4","author":"Y Chen","year":"2011","unstructured":"Chen Y, Han Vinck A (2011) Secrecy coding for the binary symmetric wiretap channel. Sec Comm Net 4(8):966\u2013978","journal-title":"Sec Comm Net"},{"issue":"19","key":"5946_CR27","doi-asserted-by":"publisher","first-page":"5165","DOI":"10.1109\/TSP.2015.2439211","volume":"63","author":"A Balatsoukas-Stimming","year":"2015","unstructured":"Balatsoukas-Stimming A, Parizi MB, Burg A (2015) LLR-based successive cancellation list decoding of polar codes. IEEE Trans Sign Proc 63(19):5165\u20135179","journal-title":"IEEE Trans Sign Proc"},{"key":"5946_CR28","doi-asserted-by":"crossref","unstructured":"Aysu A, Wang Y, Schaumont P, Orshansky M (2017) A new maskless debiasing method for lightweight physical unclonable functions. In: Proceedings of the International Symposium on Hardware Oriented Security and Trust (HOST), IEEE, pp 134\u2013139","DOI":"10.1109\/HST.2017.7951812"},{"key":"5946_CR29","doi-asserted-by":"crossref","unstructured":"Bai Y, Yan Z (2019) A secure and robust key generation method using physical unclonable functions and polar codes. In: Proceedings of the International Workshop on Signal Processing Systems (SiPS), IEEE, pp 1\u20136","DOI":"10.1109\/SiPS47522.2019.9020613"},{"issue":"12","key":"5946_CR30","doi-asserted-by":"publisher","first-page":"3165","DOI":"10.1109\/TSP.2014.2319773","volume":"62","author":"Y Fan","year":"2014","unstructured":"Fan Y, Cy Tsui (2014) An efficient partial-sum network architecture for semi-parallel polar codes decoder implementation. IEEE Trans Sign Proc 62(12):3165\u20133179","journal-title":"IEEE Trans Sign Proc"},{"issue":"12","key":"5946_CR31","doi-asserted-by":"publisher","first-page":"1378","DOI":"10.1109\/LCOMM.2011.101811.111480","volume":"15","author":"A Alamdar-Yazdi","year":"2011","unstructured":"Alamdar-Yazdi A, Kschischang FR (2011) A simplified successive-cancellation decoder for polar codes. IEEE Comm Lett 15(12):1378\u20131380","journal-title":"IEEE Comm Lett"},{"key":"5946_CR32","doi-asserted-by":"crossref","unstructured":"Guajardo J, Kumar SS, Schrijen GJ, Tuyls P (2007) FPGA intrinsic PUFs and their use for IP protection. In: Proceedings of the International workshop on cryptographic hardware and embedded systems, Springer, pp 63\u201380","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"5946_CR33","doi-asserted-by":"crossref","unstructured":"Sch\u00fcrch C (2016) A partial order for the synthesized channels of a polar code. In: Proceedings of the International Symposium on Information Theory (ISIT), IEEE, pp 220\u2013224","DOI":"10.1109\/ISIT.2016.7541293"},{"issue":"5","key":"5946_CR34","doi-asserted-by":"publisher","first-page":"2782","DOI":"10.1109\/TIT.2018.2889667","volume":"65","author":"M Mondelli","year":"2018","unstructured":"Mondelli M, Hassani SH, Urbanke RL (2018) Construction of polar codes with sublinear complexity. IEEE Trans Info Theo 65(5):2782\u20132791","journal-title":"IEEE Trans Info Theo"},{"key":"5946_CR35","doi-asserted-by":"crossref","unstructured":"Klove T (2007) Codes for error detection. World Scientific Publishing Co. Pte. Lte, Singapore","DOI":"10.1142\/6400"},{"key":"5946_CR36","unstructured":"Kusaka T (2010) Weight distribution of Reed-Muller codes. URL http:\/\/isec.ec.okayama-u.ac.jp\/home\/kusaka\/wd\/index.html, [Online; accessed 5-February-2020]"},{"key":"5946_CR37","doi-asserted-by":"crossref","unstructured":"Barbareschi M, Battista E, Mazzeo A, Mazzocca N (2015) Testing 90 nm microcontroller SRAM PUF quality. In: Proceedings of the International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), IEEE, pp 1\u20136","DOI":"10.1109\/DTIS.2015.7127360"},{"issue":"1","key":"5946_CR38","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/COMST.2020.2967127","volume":"23","author":"V Bioglio","year":"2021","unstructured":"Bioglio V, Condo C, Land I (2021) Design of polar codes in 5G new radio. IEEE Comm Surv Tutor 23(1):29\u201340","journal-title":"IEEE Comm Surv Tutor"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-021-05946-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-021-05946-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-021-05946-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T00:03:09Z","timestamp":1630368189000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-021-05946-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,18]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["5946"],"URL":"https:\/\/doi.org\/10.1007\/s10836-021-05946-0","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2021,5,18]]},"assertion":[{"value":"14 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}