{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:53:20Z","timestamp":1769284400025,"version":"3.49.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001843","name":"SERB","doi-asserted-by":"crossref","award":["EEQ\/2021\/001072"],"award-info":[{"award-number":["EEQ\/2021\/001072"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10836-024-06130-w","type":"journal-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T06:02:35Z","timestamp":1723528955000},"page":"487-496","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Investigation of Silicon Aging Effects in Dopingless PUF for Reliable Security Solution"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6974-1518","authenticated-orcid":false,"given":"Meena","family":"Panchore","sequence":"first","affiliation":[]},{"given":"Chithraja","family":"Rajan","sequence":"additional","affiliation":[]},{"given":"Jawar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,13]]},"reference":[{"issue":"6","key":"6130_CR1","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1109\/TCAD.2014.2370531","volume":"34","author":"J Delvaux","year":"2015","unstructured":"Delvaux J, Gu D, Schellekens D, Verbauwhede I (2015) Helper data algorithms for PUF-based key generation: overview and analysis. IEEE Trans. Comput Aided Design Integr Circuits Syst 34(6):889\u2013902","journal-title":"Comput Aided Design Integr Circuits Syst"},{"key":"6130_CR2","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-1-4419-8080-9_4","volume-title":"Introduction to Hardware Security and Trust","author":"U R\u00fchrmair","year":"2012","unstructured":"R\u00fchrmair U, Devadas S, Koushanfar F (2012) Security based on physical unclonability and disorder. Introduction to Hardware Security and Trust. Springer, New York, pp 65\u2013102"},{"issue":"8","key":"6130_CR3","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","volume":"102","author":"C Herder","year":"2014","unstructured":"Herder C, Yu M-D, Koushanfar F, Devadas S (2014) Physical unclonable functions and applications: a tutorial. Proc IEEE 102(8):1126\u20131141. https:\/\/doi.org\/10.1109\/JPROC.2014.2320516","journal-title":"Proc IEEE"},{"key":"6130_CR4","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.spmi.2018.12.010","volume":"126","author":"C Rajan","year":"2019","unstructured":"Rajan C, Sharma D, Samajdar DP (2019) Implementation of physical unclonable functions using hetero junction based GAA TFET. Superlattices Microstruct 126:72\u201382","journal-title":"Superlattices Microstruct"},{"key":"6130_CR5","doi-asserted-by":"crossref","unstructured":"Suzuki D, Shimizu K. The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes. In: Mangard S, Standaert FX (eds) Cryptographic Hardware and Embedded Systems. CHES 2010, Lecture Notes in Computer Science, vol. 6225. Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-15031-9_25"},{"key":"6130_CR6","doi-asserted-by":"crossref","unstructured":"Suh GE, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. Presented at the 44th Annu. Design Autom. Conf, San Diego, CA, USA, pp 9\u201314","DOI":"10.1145\/1278480.1278484"},{"key":"6130_CR7","doi-asserted-by":"publisher","unstructured":"Xu SQ, Yu W-K, Suh GE, Kan EC (2014) Understanding sources of variations in flash memory for physical unclonable functions. In: Proc. IEEE 6th Int. Memory Workshop (IMW). pp 1-4. https:\/\/doi.org\/10.1109\/IMW.2014.6849385","DOI":"10.1109\/IMW.2014.6849385"},{"key":"6130_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-642-14452-3_2","volume-title":"Towards Hardware-Intrinsic Security","author":"H Handschuh","year":"2010","unstructured":"Handschuh H, Schrijen G-J, Tuyls P (2010) Hardware intrinsic security from physically unclonable functions. Towards Hardware-Intrinsic Security. Springer, Berlin, pp 39\u201353"},{"key":"6130_CR9","doi-asserted-by":"crossref","unstructured":"Maiti A, Casarona J, McHale L, Schaumont P (2010) A large scale characterization of RO-PUF. In: Proc. IEEE Int. Symp. Hardw.-Orient. Secur. Trust (HOST). pp 94-99","DOI":"10.1109\/HST.2010.5513108"},{"issue":"9","key":"6130_CR10","doi-asserted-by":"publisher","first-page":"980","DOI":"10.1049\/mnl.2018.5675","volume":"14","author":"A Lemtur","year":"2019","unstructured":"Lemtur A, Sharma D, Patel J, Suman P, Rajan C (2019) Two-stage op-amp and integrator realisation through GaAsP\/AlGaSb nanowire CP-TFET. Micro Nano Lett 14(9):980\u2013985","journal-title":"Micro Nano Lett"},{"issue":"12","key":"6130_CR11","doi-asserted-by":"publisher","first-page":"5797","DOI":"10.1109\/TED.2020.3030868","volume":"67","author":"C Rajan","year":"2020","unstructured":"Rajan C, Samajdar DP (2020) Design principles for a novel lightweight configurable PUF using a reconfigurable FET. IEEE Trans Elect Dev 67(12):5797\u20135803","journal-title":"IEEE Trans Elect Dev"},{"key":"6130_CR12","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.spmi.2018.12.010","volume":"126","author":"C Rajan","year":"2019","unstructured":"Rajan C, Sharma D, Samajdar DP (2019) Implementation of physical unclonable functions using hetero junction based GAA TFET. Superlattice Micros 126:72\u201382","journal-title":"Superlattice Micros"},{"issue":"1","key":"6130_CR13","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/JIOT.2018.2838580","volume":"6","author":"N Kumar","year":"2019","unstructured":"Kumar N, Chen J, Kar M, Sitaraman SK, Mukhopadhyay S, Kumar S (2019) Multigated carbon nanotube field effect transistors-based physically unclonable functions as security keys. IEEE Internet Things J 6(1):325\u2013334. https:\/\/doi.org\/10.1109\/JIOT.2018.2838580","journal-title":"IEEE Internet Things J"},{"key":"6130_CR14","doi-asserted-by":"publisher","unstructured":"Yanambaka VP, Mohanty SP, Kougianos E (2018) Making use of manufacturing process variations: a dopingless transistor based-PUF for hardware-assisted security. IEEE Trans Semi-cond Manuf 31(2):285\u2013294. https:\/\/doi.org\/10.1109\/TSM.2018.2818180","DOI":"10.1109\/TSM.2018.2818180"},{"key":"6130_CR15","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1109\/ISVLSI.2017.113","volume":"2017","author":"VP Yanambaka","year":"2017","unstructured":"Yanambaka VP, Mohanty SP, Kougianos E, Sundaravadivel P, Singh J (2017) Dopingless transistor based hybrid oscillator arbiter physical unclonable function. IEEE Comput Soc Ann Symp VLSI 2017:609\u2013614. https:\/\/doi.org\/10.1109\/ISVLSI.2017.113","journal-title":"IEEE Comput Soc Ann Symp VLSI"},{"key":"6130_CR16","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.spmi.2016.11.039","volume":"101","author":"K Cecil","year":"2017","unstructured":"Cecil K, Singh J (2017) Influence of Germanium source on dopingless tunnel-FET for improved analog\/RF performance. Superlattic Micros 101:244\u2013252","journal-title":"Superlattic Micros"},{"key":"6130_CR17","doi-asserted-by":"publisher","first-page":"1196","DOI":"10.1007\/s10825-021-01688-6","volume":"20","author":"M Panchore","year":"2021","unstructured":"Panchore M, Bramhane L, Singh J (2021) Channel-hot-carrier degradation in the channel of junctionless transistors: a device-and circuit-level perspective. J Comput Electron 20:1196\u20131201","journal-title":"J Comput Electron"},{"key":"6130_CR18","doi-asserted-by":"crossref","unstructured":"Anderson R, Kuhn M (1997) Low cost attacks on tamper resistant devices. In: Proc. 5th Int. Workshop Secur. Protocols. pp 125\u2013136","DOI":"10.1007\/BFb0028165"},{"key":"6130_CR19","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/TNANO.2022.3151241","volume":"21","author":"S Priyanka","year":"2022","unstructured":"Priyanka S, Singh M. Panchore (2022) Dopingless-TFET Leaky-Integrated-Fire (LIF) Neuron For High-Speed Energy Efficient Applications. IEEE Trans Nanotech 21:110\u2013117. https:\/\/doi.org\/10.1109\/TNANO.2022.3151241","journal-title":"IEEE Trans Nanotech"},{"issue":"12","key":"6130_CR20","doi-asserted-by":"publisher","first-page":"5068","DOI":"10.1109\/TED.2016.2619621","volume":"63","author":"M Panchore","year":"2016","unstructured":"Panchore M, Singh J, Mohanty SP (2016) Impact of channel hot carrier effect in junction-and doping-free devices and circuits. IEEE Trans Electron Dev 63(12):5068\u20135071. https:\/\/doi.org\/10.1109\/TED.2016.2619621","journal-title":"IEEE Trans Electron Dev"},{"key":"6130_CR21","doi-asserted-by":"publisher","unstructured":"Kamal N, Panchore M, Singh J (2018) 3-D simulation of junction- and doping-free field-effect transistor under heavy Ion irradiation. IEEE Trans Dev Mater Reliabil 18(2):173\u2013179. https:\/\/doi.org\/10.1109\/TDMR.2018.2811493","DOI":"10.1109\/TDMR.2018.2811493"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06130-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-024-06130-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06130-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T06:07:10Z","timestamp":1728886030000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-024-06130-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["6130"],"URL":"https:\/\/doi.org\/10.1007\/s10836-024-06130-w","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8]]},"assertion":[{"value":"6 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"Accepted principles of ethical and professional conduct have been followed. No human or animals\u2019 participation involved in the research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"We agree to the terms and policies for the publication of the articles.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"We agree to the terms and policies for the publication of the articles.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}]}}