{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T11:29:39Z","timestamp":1767007779134,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T00:00:00Z","timestamp":1694736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T00:00:00Z","timestamp":1694736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10836-023-06085-4","type":"journal-article","created":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T04:01:56Z","timestamp":1694750516000},"page":"611-620","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Low Bit Instability CMOS PUF Based on Current Mirrors and WTA Cells"],"prefix":"10.1007","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2304-6944","authenticated-orcid":false,"given":"Joseph Herbert","family":"Mitchell-Moreno","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3182-6353","authenticated-orcid":false,"given":"Guillermo Espinosa","family":"Flores-Verdad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,15]]},"reference":[{"key":"6085_CR1","doi-asserted-by":"crossref","unstructured":"Atwady Y, Hammoudeh M (2017) A survey on authentication techniques for the internet of things. In: Proceedings of the International Conference on Future Networks and Distributed Systems","DOI":"10.1145\/3102304.3102312"},{"issue":"3","key":"6085_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCAS.2017.2713305","volume":"17","author":"C-H Chang","year":"2017","unstructured":"Chang C-H, Zheng Y, Zhang L (2017) A retrospective and a look forward: Fifteen years of physical unclonable function advancement. IEEE Circuits Syst Mag 17(3):32\u201362","journal-title":"IEEE Circuits Syst Mag"},{"key":"6085_CR3","doi-asserted-by":"crossref","unstructured":"Choi Y, Karpinskyy B, Ahn K-M, Kim Y, Kwon S, Park J, Lee Y, Noh M (2020) Physically unclonable function in 28nm fdsoi technology achieving high reliability for aec-q 100 grade 1 and iso 26262 asil-b. In: 2020 IEEE International Solid-State Circuits Conference-(ISSCC), pp. 426\u2013428. IEEE","DOI":"10.1109\/ISSCC19947.2020.9063075"},{"issue":"24","key":"6085_CR4","doi-asserted-by":"publisher","first-page":"1978","DOI":"10.1049\/el.2016.1991","volume":"52","author":"T Dhar","year":"2016","unstructured":"Dhar T, Trivedi A (2016) Area and energy-efficient physically unclonable function based on k-winners-take-all. Electron Lett 52(24):1978\u20131980","journal-title":"Electron Lett"},{"key":"6085_CR5","doi-asserted-by":"crossref","unstructured":"Gassend B, Clarke D, VanDijk M, Devadas S (2002) Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 148\u2013160. ACM","DOI":"10.1145\/586110.586132"},{"key":"6085_CR6","doi-asserted-by":"crossref","unstructured":"Gunay ZS, Sanchez-Sinencio E (1997) Cmos winner-take-all circuits: a detailed comparison. In: 1997 IEEE International Symposium on Circuits and Systems (ISCAS) 1:41\u201344. IEEE","DOI":"10.1109\/ISCAS.1997.608514"},{"key":"6085_CR7","doi-asserted-by":"crossref","unstructured":"Huth C, Zibuschka J, Duplys P, G\u00fcneysu T (2015) Securing systems on the internet of things via physical properties of devices and communications. In: 2015 Annual IEEE Systems Conference (SysCon) Proceedings, pp. 8\u201313. IEEE","DOI":"10.1109\/SYSCON.2015.7116721"},{"key":"6085_CR8","doi-asserted-by":"crossref","unstructured":"Hunt-Schroeder E, Xia T (2023) 12-nm stable pre-amplifier physical unclonable function with self-destruct capability. IEEE Transactions on Very Large Scale Integration (VLSI) Systems","DOI":"10.1109\/TVLSI.2023.3244860"},{"key":"6085_CR9","doi-asserted-by":"crossref","unstructured":"Jeon D, Baek JH, Kim DK, Choi B-D (2015) Towards zero bit-error-rate physical unclonable function: Mismatch-based vs. physical-based approaches in standard cmos technology. In: 2015 Euromicro Conference on Digital System Design, pp. 407\u2013414. IEEE","DOI":"10.1109\/DSD.2015.57"},{"key":"6085_CR10","doi-asserted-by":"crossref","unstructured":"Kumar R, Patil VC, Kundu S (2012) On design of temperature invariant physically unclonable functions based on ring oscillators. In: 2012 IEEE Computer Society Annual Symposium on VLSI, pp. 165\u2013170. IEEE","DOI":"10.1109\/ISVLSI.2012.66"},{"key":"6085_CR11","doi-asserted-by":"crossref","unstructured":"Lazzaro J, Ryckebusch S, Mahowald MA, Mead CA (1988) Winner-take-all networks of o (n) complexity","DOI":"10.21236\/ADA451466"},{"key":"6085_CR12","doi-asserted-by":"crossref","unstructured":"Liu K, Chen X, Pu H, Shinohara H (2020) A 0.5-v hybrid sram physically unclonable function using hot carrier injection burn-in for stability reinforcement. IEEE J Solid-State Circuits 56(7):2193\u20132204","DOI":"10.1109\/JSSC.2020.3035207"},{"key":"6085_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2023.3275577","volume-title":"A reconfigurable ldo-assisted physically unclonable function achieving a zero-ber with 14% masking","author":"J Park","year":"2023","unstructured":"Park J, Sim J-Y (2023) A reconfigurable ldo-assisted physically unclonable function achieving a zero-ber with 14% masking. Regular Papers, IEEE Transactions on Circuits and Systems I"},{"key":"6085_CR14","unstructured":"Prinetto P, Roascio G (2020) Hardware security, vulnerabilities, and attacks: A comprehensive taxonomy. In: ITASEC, pp. 177\u2013189"},{"key":"6085_CR15","volume-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications","author":"A Rukhin","year":"2001","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, Booz-allen and hamilton inc mclean va"},{"issue":"4","key":"6085_CR16","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1109\/JSSC.2016.2636859","volume":"52","author":"S Satpathy","year":"2017","unstructured":"Satpathy S, Mathew SK, Suresh V, Anders MA, Kaul H, Agarwal A, Hsu SK, Chen G, Krishnamurthy RK, De VK (2017) A 4-fj\/b delay-hardened physically unclonable function circuit with selective bit destabilization in 14-nm trigate cmos. IEEE J Solid State Circuits 52(4):940\u2013949","journal-title":"IEEE J Solid State Circuits"},{"key":"6085_CR17","doi-asserted-by":"crossref","unstructured":"Sekerkiran B, Cilingiroglu U (1998) Precision improvement in current-mode winner-take-all circuits using gain-boosted regulated-cascode cmos stages. In: 1998 IEEE International Joint Conference on Neural Networks Proceedings. IEEE World Congress on Computational Intelligence (Cat. No. 98CH36227) 1:553\u2013556. IEEE","DOI":"10.1109\/IJCNN.1998.682327"},{"key":"6085_CR18","doi-asserted-by":"crossref","unstructured":"Shamsi K, Jin Y (2016) Security of emerging non-volatile memories: Attacks and defenses. In: 2016 IEEE 34th VLSI Test Symposium (VTS), pp. 1\u20134. IEEE","DOI":"10.1109\/VTS.2016.7477293"},{"key":"6085_CR19","unstructured":"Shamsoshoara A, Korenda A, Afghah F, Zeadally S (2019) A survey on hardware-based security mechanisms for internet of things. arXiv preprint arXiv:1907.12525"},{"key":"6085_CR20","doi-asserted-by":"crossref","unstructured":"Suh GE, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: 2007 44th ACM\/IEEE Design Automation Conference, pp. 9\u201314. IEEE","DOI":"10.1109\/DAC.2007.375043"},{"key":"6085_CR21","unstructured":"Technology of Standards N.I.\u00a0 (2001) Security requirements for cryptographic modules. Technical Report Federal Information Processing Standards Publications (FIPS PUBS) 140-2, Change Notice 2 December 03, 2002, U.S. Department of Commerce, Washington, DC"},{"issue":"6","key":"6085_CR22","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TIFS.2015.2400413","volume":"10","author":"J Zhang","year":"2015","unstructured":"Zhang J, Lin Y, Lyu Y, Qu G (2015) A puf-fsm binding scheme for fpga ip protection and pay-per-device licensing. IEEE Trans Inf Forensics Secur 10(6):1137\u20131150","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6085_CR23","doi-asserted-by":"crossref","unstructured":"Zheng W, Pan X, Zhao X (2019) A low power current mode puf based on winner-take-all scheme. In: 2019 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1\u20135. IEEE","DOI":"10.1109\/ISCAS.2019.8702712"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-023-06085-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-023-06085-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-023-06085-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T03:28:31Z","timestamp":1730086111000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-023-06085-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,15]]},"references-count":23,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["6085"],"URL":"https:\/\/doi.org\/10.1007\/s10836-023-06085-4","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2023,9,15]]},"assertion":[{"value":"20 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}]}}