{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T08:46:03Z","timestamp":1648802763948},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,10,6]],"date-time":"2012-10-06T00:00:00Z","timestamp":1349481600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1007\/s13389-012-0043-1","type":"journal-article","created":{"date-parts":[[2012,10,5]],"date-time":"2012-10-05T00:19:22Z","timestamp":1349396362000},"page":"255-269","source":"Crossref","is-referenced-by-count":3,"title":["A practical device authentication scheme using SRAM PUFs"],"prefix":"10.1007","volume":"2","author":[{"given":"Patrick","family":"Koeberl","sequence":"first","affiliation":[]},{"given":"Jiangtao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Roel","family":"Maes","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Rajan","sequence":"additional","affiliation":[]},{"given":"Claire","family":"Vishik","sequence":"additional","affiliation":[]},{"given":"Marcin","family":"W\u00f3jcik","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,10,6]]},"reference":[{"key":"43_CR1","unstructured":"1-1990\u2014IEEE Standard Test Access Port and Boundary-Scan Architecture. http:\/\/standards.ieee.org\/findstds\/standard\/1149.1-1990.html"},{"key":"43_CR2","unstructured":"Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., Tuyls, P.: PUF-PRFs: a new tamper-resilient cryptographic primitive. In: Advances in Cryptology\u2014EUROCRYPT 2009 Poster Session, pp. 96\u2013102 (2000)"},{"key":"43_CR3","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B., Tuyls, P.: Memory leakage-resilient encryption based on physically unclonable functions. In: Advances in Cryptology\u2014ASIACRYPT. LNCS, vol. 5912, pp. 685\u2013702 (2009)","DOI":"10.1007\/978-3-642-10366-7_40"},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Advances in Cryptology\u2014EUROCRYPT. LNCS, vol. 3027, pp. 523\u2013540 (2004)","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"43_CR5","unstructured":"Federal Information Processing Standard 140\u20132: Security Requirements for Cryptographic Modules. http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/standards.html#02"},{"key":"43_CR6","unstructured":"Federal Information Processing Standard 186\u20133: Digital Signature Standard (DSS). http:\/\/csrc.nist.gov\/publications\/fips\/fips186-3\/fips_186-3.pdf"},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled physical random functions. In: Proceedings of the 18th Annual Computer Security Conference (2002)","DOI":"10.1109\/CSAC.2002.1176287"},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: ACM Conference on Computer and Communications Security, pp. 148\u2013160. ACM Press, New York, NY, USA (2002)","DOI":"10.1145\/586110.586132"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Cryptographic Hardware and Embedded Systems Workshop. LNCS, vol. 4727, pp. 63\u201380 (2007)","DOI":"10.1007\/978-3-540-74735-2_5"},{"issue":"9","key":"43_CR10","doi-asserted-by":"crossref","first-page":"1198","DOI":"10.1109\/TC.2008.212","volume":"58","author":"D Holcomb","year":"2009","unstructured":"Holcomb, D., Burleson, W., Fu, K.: Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 58(9), 1198\u20131210 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"43_CR11","unstructured":"ISO\/IEC16022:2006 Data Matrix bar code symbology specification. http:\/\/www.iso.org\/iso\/catalogue_detail.htm?csnumber=44230"},{"key":"43_CR12","doi-asserted-by":"crossref","unstructured":"Koeberl, P., Li, J., Maes, R., Rajan, A., Vishik, C., W\u00f3jcik, M.: Evaluation of a PUF device authentication scheme on a discrete 0.13um SRAM. In: 3rd International Conference on Trusted Systems (INTRUST). LNCS, vol. 7222, pp. 271\u2013288 (2011)","DOI":"10.1007\/978-3-642-32298-3_18"},{"key":"43_CR13","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic PUFs from flip-flops on reconfigurable devices. In: 3rd Benelux Workshop on Information and System Security (WISSec 2008), p. 17, Eindhoven, NL (2008)"},{"key":"43_CR14","unstructured":"Pappu, R.S.: Physical one-way functions. PhD thesis, Massachusetts Institute of Technology, March (2001)"},{"key":"43_CR15","unstructured":"Semiconductor Industry Association. http:\/\/www.sia-online.org\/"},{"key":"43_CR16","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference, pp. 9\u201314. ACM Press, New York, NY, USA (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"43_CR17","unstructured":"S. T20\u20131109. Specification for authentication of semiconductors and related products, (2009.) http:\/\/www.semi.org\/"},{"key":"43_CR18","unstructured":"Trusted Computing Group. TCG TPM specification 1.2, 2003. http:\/\/www.trustedcomputinggroup.org"},{"key":"43_CR19","doi-asserted-by":"crossref","unstructured":"Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Topics in Cryptology\u2014CT-RSA 2006. LNCS, vol. 3860, pp. 115\u2013131. Springer, Berlin (2006)","DOI":"10.1007\/11605805_8"},{"key":"43_CR20","unstructured":"United States Government Accountability Office. Defense supplier base: DOD should leverage ongoing initiatives in developing its program to mitigate risk of counterfeit parts. GAO-10-389, March 2010"},{"key":"43_CR21","doi-asserted-by":"crossref","unstructured":"van der Leest, V., Schrijen, G.-J., Handschuh, H., Tuyls, P.: Hardware intrinsic security from D flip-flops. In: Proceedings of the 5th ACM Workshop on Scalable Trusted Computing, STC 2010, pp. 53\u201362, ACM, New York, NY, USA (2010)","DOI":"10.1145\/1867635.1867644"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-012-0043-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-012-0043-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-012-0043-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T08:14:53Z","timestamp":1562228093000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-012-0043-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,6]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,11]]}},"alternative-id":["43"],"URL":"https:\/\/doi.org\/10.1007\/s13389-012-0043-1","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,10,6]]}}}