{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:39:13Z","timestamp":1740123553263,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["107-2218-E-006-025","107-2218-E-006-025","107-2218-E-006-025"],"award-info":[{"award-number":["107-2218-E-006-025","107-2218-E-006-025","107-2218-E-006-025"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s10836-022-06025-8","type":"journal-article","created":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T07:03:38Z","timestamp":1665731018000},"page":"511-525","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Using both Stable and Unstable SRAM Bits for the Physical Unclonable Function"],"prefix":"10.1007","volume":"38","author":[{"given":"Zhi-Wei","family":"Lai","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3526-7971","authenticated-orcid":false,"given":"Po-Hua","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Kuen-Jong","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,14]]},"reference":[{"key":"6025_CR1","doi-asserted-by":"publisher","unstructured":"Maiti A, Casarona J, McHale L, Schaumont P (2010) \u201cA large scale characterization of RO-PUF,\u201d in Proc. IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.\u00a094\u201399, https:\/\/doi.org\/10.1109\/HST.2010.5513108","DOI":"10.1109\/HST.2010.5513108"},{"issue":"3","key":"6025_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3274666","volume":"18","author":"W Liu","year":"2019","unstructured":"Liu W, Zhang L, Zhang Z, Gu C, Wang C, O\u2019Neill M, Lombardi F (2019) XOR-based low-cost reconfigurable PUFs for IoT security. ACM Trans Embedded Comput Syst (TECS) 18(3):1\u201321. https:\/\/doi.org\/10.1145\/3274666","journal-title":"ACM Trans Embedded Comput Syst (TECS)"},{"key":"6025_CR3","doi-asserted-by":"publisher","unstructured":"Herder C, Yu M, Koushanfar F, Devadas S (2014) \u201cPhysical unclonable functions and applications: A Tutorial,\u201d Proc. of the IEEE, vol.\u00a0102, no. 8, pp.\u00a01126\u20131141, https:\/\/doi.org\/10.1109\/JPROC.2014.2320516","DOI":"10.1109\/JPROC.2014.2320516"},{"issue":"4","key":"6025_CR4","doi-asserted-by":"publisher","first-page":"1853","DOI":"10.1109\/TETC.2019.2935465","volume":"9","author":"C Gu","year":"2019","unstructured":"Gu C, Liu W, Cui Y, Hanley N, O\u2019Neill M, Lombardi F (2019) A flip-flop based arbiter physical unclonable function (APUF) design with high entropy and uniqueness for FPGA implementation. IEEE Trans Emerg Top Comput 9(4):1853\u20131866. https:\/\/doi.org\/10.1109\/TETC.2019.2935465","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"6025_CR5","doi-asserted-by":"publisher","unstructured":"Tuyls P, Schrijen G-J, \u0160kori\u0107 B, Van Geloven J, Verhaegh N, Wolters R (2006) \u201cRead-proof hardware from protective coatings,\u201d in Proc. International Workshop on Cryptographic Hardware and Embedded Systems, vol.\u00a04249, pp.\u00a0369\u2013383. https:\/\/doi.org\/10.1007\/11894063_29","DOI":"10.1007\/11894063_29"},{"key":"6025_CR6","doi-asserted-by":"publisher","unstructured":"Kumar SS, Guajardo J, Maes R, Schrijen G, Tuyls P (2008) \u201cExtended abstract: The butterfly PUF protecting IP on every FPGA,\u201d in Proc. IEEE International Workshop on Hardware-Oriented Security and Trust, pp.\u00a067\u201370. https:\/\/doi.org\/10.1109\/HST.2008.4559053","DOI":"10.1109\/HST.2008.4559053"},{"key":"6025_CR7","doi-asserted-by":"publisher","unstructured":"Wu M, Yang T, Chen L, Lin C, Hu H, Su F, Wang C, Huang JP, Chen H, Lu CC, Yang EC, Shen RS (2018) \u201cA PUF scheme using competing oxide rupture with bit error rate approaching zero,\u201d in Proc. IEEE International Solid-State Circuits Conference - (ISSCC), pp.\u00a0130\u2013132. https:\/\/doi.org\/10.1109\/ISSCC.2018.8310218","DOI":"10.1109\/ISSCC.2018.8310218"},{"key":"6025_CR8","doi-asserted-by":"publisher","unstructured":"Handschuh H \u201cHardware-anchored security based on SRAM PUFs, Part 1,\u201dIEEE Security & Privacy, vol. 10, no. 3, pp.80\u201383, May-June 2012. https:\/\/doi.org\/10.1109\/MSP.2012.68","DOI":"10.1109\/MSP.2012.68"},{"key":"6025_CR9","doi-asserted-by":"publisher","unstructured":"Kazumori K, Ueno R, Homma N (2019) \u201cA ternary fuzzy extractor for efficient cryptographic key generation,\u201d in Proc. IEEE International Symposium on Multiple-Valued Logic (ISMVL), pp.\u00a049\u201354. https:\/\/doi.org\/10.1109\/ISMVL.2019.00017","DOI":"10.1109\/ISMVL.2019.00017"},{"key":"6025_CR10","doi-asserted-by":"publisher","unstructured":"Mathew SK, Satpathy SK, Anders MA, Kaul H, Hsu SK, Agarwal A, Chen GK, Parker RJ, Krishnamurthy RK, De V (2014) \u201cA 0.19pJ\/b PVT-variation-tolerant hybrid physically unclonable function circuit for 100% stable secure key generation in 22nm CMOS,\u201d in Proc. IEEE International Solid-State Circuits Conference (ISSCC), pp.\u00a0278\u2013279. https:\/\/doi.org\/10.1109\/ISSCC.2014.6757433","DOI":"10.1109\/ISSCC.2014.6757433"},{"key":"6025_CR11","doi-asserted-by":"publisher","unstructured":"Satpathy S, Mathew SK, Suresh V, Anders MA, Kaul H, Agarwal A, Hsu SK, Chen G, Krishnamurthy RK, De VK (April 2017) A 4-fJ\/b delay-hardened physically unclonable function circuit with selective bit destabilization in 14-nm trigate CMOS. IEEE J Solid-State Circuits 52(4):940\u2013949. https:\/\/doi.org\/10.1109\/JSSC.2016.2636859","DOI":"10.1109\/JSSC.2016.2636859"},{"key":"6025_CR12","doi-asserted-by":"publisher","unstructured":"Jang J, Ghosh S (2015) \u201cDesign and analysis of novel SRAM PUFs with embedded latch for robustness,\u201d in Proc. International Symposium on Quality Electronic Design, pp.\u00a0298\u2013302. https:\/\/doi.org\/10.1109\/ISQED.2015.7085443","DOI":"10.1109\/ISQED.2015.7085443"},{"key":"6025_CR13","doi-asserted-by":"publisher","unstructured":"Zhou C, Satapathy S, Lao Y, Parhi KK, Kim CH (2016) \u201cSoft response generation and thresholding strategies for linear and feed-forward MUX PUFs,\u201d in Proc. International Symposium on Low Power Electronics and Design, pp.\u00a0124\u2013129. https:\/\/doi.org\/10.1145\/2934583.2934613","DOI":"10.1145\/2934583.2934613"},{"key":"6025_CR14","doi-asserted-by":"publisher","unstructured":"Xiao K, Rahman MT, Forte D, Huang Y, Su M, Tehranipoor M (2014) \u201cBit selection algorithm suitable for high-volume production of SRAM-PUF,\u201d in Proc. IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.\u00a0101\u2013106. https:\/\/doi.org\/10.1109\/HST.2014.6855578","DOI":"10.1109\/HST.2014.6855578"},{"key":"6025_CR15","doi-asserted-by":"publisher","unstructured":"Liu M, Zhou C, Tang Q, Parhi KK, Kim CH (2017) \u201cA data remanence based approach to generate 100% stable keys from an SRAM physical unclonable function,\u201d in Proc. IEEE\/ACM International Symposium on Low Power Electronics and Design (ISLPED), pp.\u00a01\u20136. https:\/\/doi.org\/10.1109\/ISLPED.2017.8009192","DOI":"10.1109\/ISLPED.2017.8009192"},{"key":"6025_CR16","doi-asserted-by":"publisher","unstructured":"Saraza-Canflanca P, Carrasco-Lopez H, Santana-Andreo A, Brox P, Castro-Lopez R, Roca E, Fernandez FV (2021) Improving the reliability of SRAM-based PUF under varying operation conditions and aging degradation. Microelectron Reliab 118(114049). https:\/\/doi.org\/10.1016\/j.microrel.2021.114049","DOI":"10.1016\/j.microrel.2021.114049"},{"key":"6025_CR17","doi-asserted-by":"publisher","unstructured":"Wang W, Singh AD, Guin U (2022) A systematic bit selection method toward robust and unique SRAM PUFs. J Electron Testing: Theory Appl (JETTA) 38(3):235-246. https:\/\/doi.org\/10.1007\/s10836-022-06006-x","DOI":"10.1007\/s10836-022-06006-x"},{"key":"6025_CR18","doi-asserted-by":"publisher","unstructured":"R\u00fchrmair U, S\u00f6lter J (2014) \u201cPUF modeling attacks: An introduction and overview,\u201d in Proc. Design, Automation & Test in Europe Conference & Exhibition (DATE), pp.\u00a01\u20136. https:\/\/doi.org\/10.7873\/DATE. 2014.361","DOI":"10.7873\/DATE"},{"key":"6025_CR19","doi-asserted-by":"publisher","unstructured":"Wei S, Wendt JB, Nahapetian A, Potkonjak M (2014) \u201cReverse engineering and prevention techniques for physical unclonable functions using side channels,\u201d in Proc. Design Automation Conference, pp.\u00a01\u20136. https:\/\/doi.org\/10.1145\/2593069.2593204","DOI":"10.1145\/2593069.2593204"},{"key":"6025_CR20","doi-asserted-by":"publisher","unstructured":"Helfmeier C, Boit C, Nedospasov D, Seifert J (2013) \u201cCloning physically unclonable functions,\u201d in Proc. IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.\u00a01\u20136. https:\/\/doi.org\/10.1109\/HST.2013.6581556","DOI":"10.1109\/HST.2013.6581556"},{"key":"6025_CR21","doi-asserted-by":"publisher","unstructured":"Cambou B, Orlowski M (2016) \u201cPUF designed with resistive RAM and ternary states,\u201d in Proc. Cyber and Information Security Research Conference, pp.\u00a01\u20138. https:\/\/doi.org\/10.1145\/2897795. 2897808","DOI":"10.1145\/2897795"},{"key":"6025_CR22","doi-asserted-by":"publisher","unstructured":"Korenda AR, Afghah F, Cambou B (2018) \u201cA secret key generation scheme for Internet of Things using ternary-states ReRAM-based physical unclonable functions,\u201d in Proc. International Wireless Communications & Mobile Computing Conference (IWCMC), pp.\u00a01261\u20131266. https:\/\/doi.org\/10.1109\/IWCMC.2018.8450341","DOI":"10.1109\/IWCMC.2018.8450341"},{"key":"6025_CR23","doi-asserted-by":"publisher","unstructured":"Mohammadinodoushan M, Cambou B, Philabaum C, Hely D, Booher DD (2019) \u201cImplementation of password management system using ternary addressable PUF generator,\u201d in Proc. IEEE International Conference on Sensing, Communication, and Networking (SECON), pp.\u00a01\u20138. https:\/\/doi.org\/10.1109\/SAHCN.2019.8824792","DOI":"10.1109\/SAHCN.2019.8824792"},{"key":"6025_CR24","doi-asserted-by":"publisher","unstructured":"Yamamoto D, Sakiyama K, Iwamoto M, Ohta K, Ochiai T, Takenaka M, Itoh K (2011) \u201cUniqueness enhancement of PUF responses based on the locations of random outputting RS latches,\u201d in Proc. International Workshop on Cryptographic Hardware and Embedded Systems, pp.\u00a0390\u2013406. https:\/\/doi.org\/10.1007\/978-3-642-23951-9_26","DOI":"10.1007\/978-3-642-23951-9_26"},{"key":"6025_CR25","doi-asserted-by":"publisher","unstructured":"Lai Z, Lee K (2019) \u201cUsing unstable SRAM bits for physical unclonable function applications on off-the-shelf SRAM,\u201d in Proc. IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), pp.\u00a041\u201344. https:\/\/doi.org\/10.1109\/APCCAS47518.2019.8953143","DOI":"10.1109\/APCCAS47518.2019.8953143"},{"key":"6025_CR26","doi-asserted-by":"publisher","unstructured":"Maiti A, Schaumont P (2014) The impact of aging on a physical unclonable function. IEEE Trans Very Large Scale Integr VLSI Syst 22(9):1854\u20131864. https:\/\/doi.org\/10.1109\/TVLSI.2013.2279875","DOI":"10.1109\/TVLSI.2013.2279875"},{"issue":"4","key":"6025_CR27","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10207-011-0139-0","volume":"10","author":"N Saxena","year":"2011","unstructured":"Saxena N, Voris J (2011) Data remanence effects on memory-based entropy collection for RFID systems. Int J Inf Secur 10(4):213\u2013222. https:\/\/doi.org\/10.1007\/s10207-011-0139-0","journal-title":"Int J Inf Secur"},{"key":"6025_CR28","doi-asserted-by":"publisher","unstructured":"Anagnostopoulos NA, Arul T, Rosenstihl M, Schaller A, Gabmeyer S, Katzenbeisser S (2018) \u201cLow-temperature data remanence attacks against intrinsic SRAM PUFs,\u201d in Proc. Euromicro Conference on Digital System Design (DSD), pp.\u00a0581\u2013585. https:\/\/doi.org\/10.1109\/DSD.2018.00102","DOI":"10.1109\/DSD.2018.00102"},{"key":"6025_CR29","doi-asserted-by":"publisher","unstructured":"Tuan T, Strader T, Trimberger S (2007) \u201cAnalysis of data remanence in a 90nm FPGA,\u201d in Proc. IEEE Custom Integrated Circuits Conference, pp.\u00a093\u201396. https:\/\/doi.org\/10.1109\/CICC.2007.4405689","DOI":"10.1109\/CICC.2007.4405689"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-022-06025-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-022-06025-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-022-06025-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T05:24:12Z","timestamp":1669181052000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-022-06025-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["6025"],"URL":"https:\/\/doi.org\/10.1007\/s10836-022-06025-8","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2022,10]]},"assertion":[{"value":"18 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The co-author, Kuen-Jong Lee, is one of the Editorial Board Members of Journal of Electronic Testing: Theory and Applications.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}