{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T06:25:36Z","timestamp":1774938336104,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10836-022-06034-7","type":"journal-article","created":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T03:04:55Z","timestamp":1671246295000},"page":"653-666","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Design and Evaluation of XOR Arbiter Physical Unclonable Function and its Implementation on FPGA in Hardware Security Applications"],"prefix":"10.1007","volume":"38","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7357-5636","authenticated-orcid":false,"given":"R.","family":"Naveenkumar","sequence":"first","affiliation":[]},{"given":"N. M.","family":"Sivamangai","sequence":"additional","affiliation":[]},{"given":"A.","family":"Napolean","sequence":"additional","affiliation":[]},{"given":"S. Sridevi Sathya","family":"Priya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,17]]},"reference":[{"key":"6034_CR1","doi-asserted-by":"publisher","unstructured":"El-hajj M, Chamoun M, Fadlallah A, Serhrouchni A (2017) Taxonomy of authentication techniques in Internet of Things (IoT). IEEE 15th Student Conference on Research and Development (SCOReD) 67\u201371. https:\/\/doi.org\/10.1109\/SCORED.2017.8305419","DOI":"10.1109\/SCORED.2017.8305419"},{"issue":"5","key":"6034_CR2","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.3390\/s19051141","volume":"19","author":"M El-hajj","year":"2019","unstructured":"El-hajj M, Fadlallah A, Chamoun M, Serhrouchni A (2019) A Survey of Internet of Things (IoT) Authentication Schemes. Sensors (Basel, Switzerland) 19(5):1141. https:\/\/doi.org\/10.3390\/s19051141","journal-title":"Sensors (Basel, Switzerland)"},{"key":"6034_CR3","doi-asserted-by":"publisher","unstructured":"Naveenkumar R, Sivamangai N M, Napolean A, Janani V (2021) A Survey on Recent Detection Methods of the Hardware Trojans. 3rd International Conference on Signal Processing and Communication (ICPSC) 139\u2013143. https:\/\/doi.org\/10.1109\/ICSPC51351.2021.9451682","DOI":"10.1109\/ICSPC51351.2021.9451682"},{"key":"6034_CR4","doi-asserted-by":"publisher","unstructured":"Naveenkumar R, Sivamangai N M, Napolean A, Nissi G A (2022) Hardware Obfuscation for IP Protection of DSP Applications. J. Electron. Test 38: 9\u201320. https:\/\/doi.org\/10.1007\/s10836-022-05984-2","DOI":"10.1007\/s10836-022-05984-2"},{"key":"6034_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/dsd.2015.51","author":"DP Sahoo","year":"2015","unstructured":"Sahoo DP, Chakraborty RS, Mukhopadhyay D (2015) Towards Ideal Arbiter PUF Design on Xilinx FPGA: A Practitioner\u2019s Perspective. Euromicro Conference on Digital System Design. https:\/\/doi.org\/10.1109\/dsd.2015.51","journal-title":"Euromicro Conference on Digital System Design"},{"key":"6034_CR6","doi-asserted-by":"publisher","unstructured":"Mahalat M H, Mandal S, Mondal A, Sen B (2019) An Efficient Implementation of Arbiter PUF on FPGA for IoT Application. 32nd IEEE International System-on-Chip Conference (SOCC) 324\u2013329. https:\/\/doi.org\/10.1109\/socc46988.2019.157054","DOI":"10.1109\/socc46988.2019.157054"},{"key":"6034_CR7","doi-asserted-by":"publisher","first-page":"2831","DOI":"10.1109\/TIFS.2018.2832849","volume":"13","author":"P Gope","year":"2018","unstructured":"Gope P, Lee J, Quek TQ (2018) Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions. IEEE Trans Inf Forensics Secur 13:2831\u20132843. https:\/\/doi.org\/10.1109\/TIFS.2018.2832849","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6034_CR8","doi-asserted-by":"publisher","first-page":"181751","DOI":"10.1109\/access.2020.3028514","volume":"8","author":"Z He","year":"2020","unstructured":"He Z, Chen W, Zhang L, Chi G, Gao Q, Harn L (2020) A Highly Reliable Arbiter PUF With Improved Uniqueness in FPGA Implementation Using Bit-Self-Test. IEEE Access 8:181751\u2013181762. https:\/\/doi.org\/10.1109\/access.2020.3028514","journal-title":"IEEE Access"},{"key":"6034_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/iscas.2017.8050671","author":"SS Zalivaka","year":"2017","unstructured":"Zalivaka SS, Ivaniuk AA, Chang C (2017) Low-cost fortification of arbiter PUF against modeling attack. IEEE International Symposium on Circuits and Systems (ISCAS). https:\/\/doi.org\/10.1109\/iscas.2017.8050671","journal-title":"IEEE International Symposium on Circuits and Systems (ISCAS)"},{"key":"6034_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_27","author":"S Tajik","year":"2014","unstructured":"Tajik S, Dietz E, Frohmann S, Seifert J, Nedospasov D, Helfmeier C, Boit C, Dittrich H (2014) Physical Characterization of Arbiter PUFs. IACR Cryptol ePrint Arch. https:\/\/doi.org\/10.1007\/978-3-662-44709-3_27","journal-title":"IACR Cryptol ePrint Arch"},{"key":"6034_CR11","doi-asserted-by":"publisher","unstructured":"Lim D, Lee J W, Gassend B, Suh G E, Dijk M V, Devadas S (2005) Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 13:1200\u20131205. https:\/\/doi.org\/10.1109\/TVLSI.2005.859470","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"6034_CR12","doi-asserted-by":"publisher","unstructured":"Yao J, Pang L, Zhang Z, Yang W, Fu A, Gao Y (2022) Design and Evaluate Recomposited OR-AND-XOR-PUF. IEEE Trans. Emerg. Top. Comput. 10: 662\u2013677. https:\/\/doi.org\/10.1109\/tetc.2022.3170320","DOI":"10.1109\/tetc.2022.3170320"},{"issue":"4","key":"6034_CR13","doi-asserted-by":"publisher","first-page":"1853","DOI":"10.1109\/TETC.2019.2935465","volume":"9","author":"C Gu","year":"2021","unstructured":"Gu C, Liu W, Cui Y, Hanley N, O\u2019Neill M, Lombardi F (2021) A Flip-Flop Based Arbiter Physical Unclonable Function (APUF) Design with High Entropy and Uniqueness for FPGA Implementation. IEEE Trans Emerg Top Comput 9(4):1853\u20131866. https:\/\/doi.org\/10.1109\/TETC.2019.2935465","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"6034_CR14","doi-asserted-by":"publisher","unstructured":"Hospodar G, Maes R, Verbauwhede I M (2012) Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability. 2012 IEEE International Workshop on Information Forensics and Security (WIFS) 37\u201342. https:\/\/doi.org\/10.1109\/WIFS.2012.6412622","DOI":"10.1109\/WIFS.2012.6412622"},{"key":"6034_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2017.8073845","author":"MS Alkatheiri","year":"2017","unstructured":"Alkatheiri MS, Zhuang Y (2017) Towards fast and accurate machine learning attacks of feed-forward arbiter PUFs. IEEE Conference on Dependable and Secure Computing. https:\/\/doi.org\/10.1109\/DESEC.2017.8073845","journal-title":"IEEE Conference on Dependable and Secure Computing"},{"issue":"10","key":"6034_CR16","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.3390\/electronics9101715","volume":"9","author":"KT Mursi","year":"2020","unstructured":"Mursi KT, Thapaliya B, Zhuang Y, Aseeri AO, Alkatheiri MS (2020) A Fast Deep Learning Method for Security Vulnerability Study of XOR PUFs. Electronics 9(10):1715. https:\/\/doi.org\/10.3390\/electronics9101715","journal-title":"Electronics"},{"key":"6034_CR17","doi-asserted-by":"publisher","DOI":"10.1145\/1840845.1840855","author":"L Lin","year":"2010","unstructured":"Lin L, Holcomb DE, Krishnappa DK, Shabadi P, Burleson WP (2010) Low-power sub-threshold design of secure physical unclonable functions. ACM\/IEEE International Symposium on Low-Power Electronics and Design (ISLPED). https:\/\/doi.org\/10.1145\/1840845.1840855","journal-title":"ACM\/IEEE International Symposium on Low-Power Electronics and Design (ISLPED)"},{"key":"6034_CR18","doi-asserted-by":"publisher","unstructured":"Machida T, Yamamoto D, Iwamoto M, Sakiyama K (2015) Implementation of double arbiter PUF and its performance evaluation on FPGA. The 20th Asia and South Pacific Design Automation Conference 6\u20137. https:\/\/doi.org\/10.1109\/ASPDAC.2015.7058919","DOI":"10.1109\/ASPDAC.2015.7058919"},{"key":"6034_CR19","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/tifs.2018.2870835","volume":"14","author":"SS Zalivaka","year":"2019","unstructured":"Zalivaka SS, Ivaniuk AA, Chang C (2019) Reliable and Modeling Attack Resistant Authentication of Arbiter PUF in FPGA Implementation With Trinary Quadruple Response. IEEE Trans Inf Forensics Secur 14:1109\u20131123. https:\/\/doi.org\/10.1109\/tifs.2018.2870835","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6034_CR20","unstructured":"Patterson M, Zambreno J, Sabotta C, Vyas S, Mills A (2011) Ring Oscillator PUF Design and Results"},{"key":"6034_CR21","doi-asserted-by":"publisher","unstructured":"Wen J, Huang M, Chen Z, Zhu L, Chen S, Li B (2019) A Multi-line Arbiter PUF with Improved Reliability and Uniqueness. IEEE 4th International Conference on Signal and Image Processing (ICSIP) 641\u2013648. https:\/\/doi.org\/10.1109\/siprocess.2019.886888","DOI":"10.1109\/siprocess.2019.886888"},{"issue":"2","key":"6034_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1587\/elex.16.20190670","volume":"17","author":"W Ge","year":"2020","unstructured":"Ge W, Hu S, Huang J, Liu B, Zhu M (2020) FPGA implementation of a challenge pre-processing structure arbiter PUF designed for machine learning attack resistance. IEICE Electron Express 17(2):1\u20136. https:\/\/doi.org\/10.1587\/elex.16.20190670","journal-title":"IEICE Electron Express"},{"key":"6034_CR23","doi-asserted-by":"publisher","unstructured":"Ruhrmair U, Sehnke F, Solter, J, Dror G, Devadas S, Schmidhuber J (2010) Modeling attacks on physical unclonable functions. Proceedings of the 17th ACM conference on Computer and communications security 237\u2013249.\u00a0https:\/\/doi.org\/10.1145\/1866307.1866335","DOI":"10.1145\/1866307.1866335"},{"key":"6034_CR24","doi-asserted-by":"publisher","unstructured":"Mursi K T, Zhuang Y, Alkatheiri M S, Aseeri A O (2019) Extensive Examination of XOR Arbiter PUFs as Security Primitives for Resource-Constrained IoT Devices. 17th International Conference on Privacy, Security and Trust (PST) 1\u20139. https:\/\/doi.org\/10.1109\/pst47121.2019.8949070","DOI":"10.1109\/pst47121.2019.8949070"},{"key":"6034_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00014","author":"AO Aseeri","year":"2018","unstructured":"Aseeri AO, Zhuang Y, Alkatheiri MS (2018) A Machine Learning-Based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things. IEEE International Congress on Internet of Things (ICIOT). https:\/\/doi.org\/10.1109\/ICIOT.2018.00014","journal-title":"IEEE International Congress on Internet of Things (ICIOT)"},{"key":"6034_CR26","doi-asserted-by":"publisher","unstructured":"Becker G T (2015) The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs. Cryptographic Hardware and Embedded Systems (CHES), Lecture Notes in Computer Science (9293):535\u2013555.\u00a0https:\/\/doi.org\/10.1007\/978-3-662-48324-4_27","DOI":"10.1007\/978-3-662-48324-4_27"},{"key":"6034_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.30","author":"M Majzoobi","year":"2012","unstructured":"Majzoobi M, Rostami M, Koushanfar F, Wallach DS, Devadas S (2012) Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching. IEEE Symposium on Security and Privacy Workshops. https:\/\/doi.org\/10.1109\/SPW.2012.30","journal-title":"IEEE Symposium on Security and Privacy Workshops"},{"issue":"11","key":"6034_CR28","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1109\/TIFS.2013.2279798","volume":"8","author":"U Ruhrmair","year":"2013","unstructured":"Ruhrmair U, Solter J, Sehnke F, Xu X, Mahmoud A, Stoyanova V, Dror G, Schmidhuber J, Burleson WP, Devadas S (2013) PUF Modeling Attacks on Simulated and Silicon Data. IEEE Trans Inf Forensics Secur 8(11):1876\u20131891. https:\/\/doi.org\/10.1109\/TIFS.2013.2279798","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6034_CR29","doi-asserted-by":"publisher","unstructured":"Sushma R, Murty N S (2018) Feedback Oriented XORed Flip-Flop Based Arbiter PUF. International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT) 1444\u20131448. https:\/\/doi.org\/10.1109\/iceeccot43722.2018.9001605","DOI":"10.1109\/iceeccot43722.2018.9001605"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-022-06034-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-022-06034-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-022-06034-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T06:04:17Z","timestamp":1674713057000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-022-06034-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":29,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["6034"],"URL":"https:\/\/doi.org\/10.1007\/s10836-022-06034-7","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"31 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and Animal Participants"}},{"value":"Nil.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}