{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T01:08:29Z","timestamp":1648861709001},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T00:00:00Z","timestamp":1581292800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T00:00:00Z","timestamp":1581292800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11432-018-9540-y","type":"journal-article","created":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T03:02:35Z","timestamp":1581562955000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An improved PAAs countermeasure based on permutation tables and latch PUF"],"prefix":"10.1007","volume":"63","author":[{"given":"Bing","family":"Li","sequence":"first","affiliation":[]},{"given":"Shuai","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,10]]},"reference":[{"key":"9540_CR1","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-540-85855-3_19","volume-title":"Proceedings of International Conference on Security and Cryptography for Networks","author":"J Coron","year":"2008","unstructured":"Coron J. A new DPA countermeasure based on permutation tables. In: Proceedings of International Conference on Security and Cryptography for Networks, 2008. 278\u2013292"},{"key":"9540_CR2","first-page":"37","volume-title":"Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust","author":"H Maghrebi","year":"2012","unstructured":"Maghrebi H, Guilley S, Prouff E, et al. Register leakage masking using gray code. In: Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust, 2012. 37\u201342"},{"key":"9540_CR3","volume-title":"Physically Unclonable Functions: Constructions, Properties and Applications","author":"R Maes","year":"2016","unstructured":"Maes R. Physically Unclonable Functions: Constructions, Properties and Applications. Berlin: Springer, 2016"},{"key":"9540_CR4","first-page":"012108","volume":"59","author":"B Li","year":"2016","unstructured":"Li B, Chen S. A dynamic PUF anti-aging authentication system based on restrict race code. Sci China Inf Sci, 2016, 59: 012108","journal-title":"Sci China Inf Sci"},{"key":"9540_CR5","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1587\/transinf.E95.D.426","volume":"95","author":"H Hata","year":"2012","unstructured":"Hata H, Ichikawa S. FPGA Implementation of metastability-based true random number generator. IEICE Trans Inf Syst, 2012, 95: 426\u2013436","journal-title":"IEICE Trans Inf Syst"},{"key":"9540_CR6","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.micpro.2018.02.001","volume":"59","author":"S Chen","year":"2018","unstructured":"Chen S, Li B, Zhou C J. FPGA implementation of SRAM PUFs based cryptographically secure pseudorandom number generator. Microprocess MicroSyst, 2018, 59: 57\u201368","journal-title":"Microprocess MicroSyst"},{"key":"9540_CR7","volume-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","author":"A Rukhin","year":"2010","unstructured":"Rukhin A, Soto J, Nechvatal J, et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical Report SP 800\u201322 Rev. 1a, 2010"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9540-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-018-9540-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9540-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T23:57:09Z","timestamp":1612915029000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-018-9540-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,10]]},"references-count":7,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["9540"],"URL":"https:\/\/doi.org\/10.1007\/s11432-018-9540-y","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,10]]},"assertion":[{"value":"27 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"139104"}}