{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:23:38Z","timestamp":1776680618805,"version":"3.51.2"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2012,11,24]],"date-time":"2012-11-24T00:00:00Z","timestamp":1353715200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1007\/s11623-012-0295-z","type":"journal-article","created":{"date-parts":[[2012,11,23]],"date-time":"2012-11-23T08:29:55Z","timestamp":1353659395000},"page":"881-885","source":"Crossref","is-referenced-by-count":8,"title":["Physical Unclonable Functions"],"prefix":"10.1007","volume":"36","author":[{"given":"Stefan","family":"Katzenbeisser","sequence":"first","affiliation":[]},{"given":"Andr\u00e9","family":"Schaller","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,24]]},"reference":[{"key":"295_CR1","doi-asserted-by":"crossref","unstructured":"Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Fran\u00e7is-Xavier Standaert, Christian Wachsmann: A Formalization of the Security Features of Physical Functions. IEEE Symposium on Security and Privacy 2011, IEEE Press, S. 397\u2013412","DOI":"10.1109\/SP.2011.10"},{"key":"295_CR2","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-33027-8_17","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"Stefan Katzenbeisser","year":"2012","unstructured":"Stefan Katzenbeisser, \u00dcnal Ko\u00e7abas, Vladimir Rozic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann: PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon. CHES 2012, Springer Verlag, S. 283\u2013301"},{"key":"295_CR3","first-page":"3","volume-title":"Information Security and Cryptography","author":"Roel Maes","year":"2010","unstructured":"Roel Maes, Ingrid Verbauwhede: Physically Unclonable Functions: A Study on the State of the Art and Future Research Dorections. in Sadeghi, Naccache (Hrsg.), Towards Hardware-Intrinsic Security, Springer Verlag, 2010, S. 3\u201338."},{"key":"295_CR4","doi-asserted-by":"crossref","unstructured":"Dominik Merli, Dieter Schuster, Frederic Stumpf, Georg Sigl: Side-Channel Analysis of PUFs and Fuzzy Extractors. TRUST 2011, Springer Verlag, S. 33\u201347","DOI":"10.1007\/978-3-642-21599-5_3"},{"key":"295_CR5","doi-asserted-by":"crossref","unstructured":"Ulrich R\u00fchrmair, Jan S\u00f6lter, Frank Sehnke: On the Foundations of Physical Unclonable Functions. IACR Cryptology ePrint Archive, Report 2009\/277","DOI":"10.1145\/1866307.1866335"},{"key":"295_CR6","doi-asserted-by":"crossref","unstructured":"Ulrich R\u00fchrmair, Frank Sehnke, Jan S\u00f6lter, Gideon Dror, Srinivas Devadas, J\u00fcrgen Schmidhuber: Modeling attacks on physical unclonable functions. ACM Conference on Computer and Communications Security, 2010, S. 237\u2013249","DOI":"10.1145\/1866307.1866335"},{"key":"295_CR7","doi-asserted-by":"crossref","unstructured":"Ulrich R\u00fchrmair, Heike Busch, Stefan Katzenbeisser: Strong PUFs: Models, Constructions and Security Proofs. Sadeghi, Naccache (Hrsg.), Towards Hardware-Intrinsic Security, Springer Verlag, 2010, S. 79\u201396","DOI":"10.1007\/978-3-642-14452-3_4"},{"key":"295_CR8","doi-asserted-by":"crossref","unstructured":"Unal Kocabas, Andreas Peter, Stefan Katzenbeisser, Ahmad-Reza Sadeghi: Converse PUF-based Authentication. TRUST 2012, Springer Verlag, S. 142\u2013158","DOI":"10.1007\/978-3-642-30921-2_9"},{"key":"295_CR9","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11605805_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"Pim Tuyls","year":"2006","unstructured":"Pim Tuyls, Lejla Batina: RFID-Tags for Anti-counterfeiting. CT-RSA 2006, Springer Verlag, S. 115\u2013131"},{"key":"295_CR10","doi-asserted-by":"crossref","unstructured":"Pim Tuyls et al, \u201cSecure Key Storage with PUFs\u201d, in Tuyls, Skoric, Kevenaar (Hrsg), Security with Noisy Data, Springer, 2007, S. 269\u2013292","DOI":"10.1007\/978-1-84628-984-2_16"},{"key":"295_CR11","doi-asserted-by":"crossref","unstructured":"Abhranil Maiti et al, Physical Unclonable Function and True Random Number Generator: a Compact and Scalable Implementation, GLSVLSI 2009, ACM Press, S. 425\u2013428","DOI":"10.1145\/1531542.1531639"},{"key":"295_CR12","doi-asserted-by":"crossref","unstructured":"Christina Brzuska et al: Physically Uncloneable Functions in the Universal Composition Framework. CRYPTO 2011, Springer Verlag, S. 51\u201370","DOI":"10.1007\/978-3-642-22792-9_4"},{"key":"295_CR13","doi-asserted-by":"crossref","unstructured":"Klaus Kursawe et al: Reconfigurable Physical Unclonable Functions \u2014 Enabling Technology for Tamper-Resistant Storage. HOST 2009, IEEE Press, S. 22\u201329","DOI":"10.1109\/HST.2009.5225058"},{"key":"295_CR14","doi-asserted-by":"crossref","unstructured":"Pim Tuyls et al: Read-Proof Hardware from Protective Coatings. CHES 2006, Springer Verlag, 369\u2013383","DOI":"10.1007\/11894063_29"},{"key":"295_CR15","doi-asserted-by":"crossref","unstructured":"Jorge Guajardo et al: Brand and IP Protection with Physical Unclonable Functions. ISCAS 2008, IEEE Press, S. 3186\u20133189.","DOI":"10.1109\/ISCAS.2008.4542135"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0295-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0295-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0295-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0295-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T00:39:18Z","timestamp":1687826358000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0295-z"}},"subtitle":["Sicherheitseigenschaften und Anwendungen"],"short-title":[],"issued":{"date-parts":[[2012,11,24]]},"references-count":15,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["295"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0295-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,24]]}}}