{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T11:45:13Z","timestamp":1759146313222},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,11,25]],"date-time":"2014-11-25T00:00:00Z","timestamp":1416873600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s13389-014-0091-9","type":"journal-article","created":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T09:10:48Z","timestamp":1417511448000},"page":"187-199","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs"],"prefix":"10.1007","volume":"5","author":[{"given":"Dai","family":"Yamamoto","sequence":"first","affiliation":[]},{"given":"Kazuo","family":"Sakiyama","sequence":"additional","affiliation":[]},{"given":"Mitsugu","family":"Iwamoto","sequence":"additional","affiliation":[]},{"given":"Kazuo","family":"Ohta","sequence":"additional","affiliation":[]},{"given":"Masahiko","family":"Takenaka","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Itoh","sequence":"additional","affiliation":[]},{"given":"Naoya","family":"Torii","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,25]]},"reference":[{"key":"91_CR1","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-642-14452-3_6","volume-title":"Towards Hardware-Intrinsic Security, Information Security and Cryptography","author":"F Armknecht","year":"2010","unstructured":"Armknecht, F., Maes, R., Sadeghi, A.R., Sunar, B., Tuyls, P.: Memory leakage-resilient encryption based on physically unclonable functions. In: Sadeghi, A.R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp. 135\u2013164. Springer, Berlin (2010)"},{"key":"91_CR2","doi-asserted-by":"crossref","unstructured":"van den Berg, R., Skoric, B., van der Leest, V.: Bias-based modeling and entropy analysis of PUFs. In: Proceedings of the 3rd International Workshop on Trustworthy Embedded Devices, TrustED \u201813, pp. 13\u201320. ACM (2013)","DOI":"10.1145\/2517300.2517301"},{"issue":"10","key":"91_CR3","doi-asserted-by":"crossref","first-page":"2041","DOI":"10.1109\/TC.2012.196","volume":"62","author":"A Bogdanov","year":"2013","unstructured":"Bogdanov, A., Knezevic, M., Leander, G., Toz, D., Varici, K., Verbauwhede, I.: Spongent: the design space of lightweight cryptographic hashing. IEEE Trans. Comput. 62(10), 2041\u20132053 (2013)","journal-title":"IEEE Trans. Comput."},{"key":"91_CR4","doi-asserted-by":"crossref","unstructured":"B\u00f6sch, C., Guajardo, J., Sadeghi, A.R., Shokrollahi, J., Tuyls, P.: Efficient helper data key extractor on FPGAs. In: CHES, pp. 181\u2013197 (2008)","DOI":"10.1007\/978-3-540-85053-3_12"},{"key":"91_CR5","doi-asserted-by":"crossref","unstructured":"Briais, S., Cioranesco, J.M., Danger, J.L., Guilley, S., Naccache, D., Porteboeuf, T.: Random active shield. In: Fault Diagnosis and Tolerance in Cryptography (FDTC), 2012 Workshop on, pp. 103\u2013113 (2012)","DOI":"10.1109\/FDTC.2012.11"},{"key":"91_CR6","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38, 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"key":"91_CR7","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of CCS pp. 148\u2013160 (2002)","DOI":"10.1145\/586110.586132"},{"key":"91_CR8","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., Lim, D., van Dijk, M., Devadas, S.: Identification and authentication of integrated circuits. In: Concurrency and computation: practice and experiences., pp. 1077\u20131098 (2004)","DOI":"10.1002\/cpe.805"},{"issue":"6","key":"91_CR9","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSPEC.2012.6203952","volume":"49","author":"C Gorman","year":"2012","unstructured":"Gorman, C.: Counterfeit chips on the rise. Spectr. IEEE 49(6), 16\u201317 (2012)","journal-title":"Spectr. IEEE"},{"key":"91_CR10","doi-asserted-by":"crossref","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. CHES 2007, 63\u201380 (2007)","DOI":"10.1007\/978-3-540-74735-2_5"},{"issue":"D\u20132","key":"91_CR11","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1587\/transinf.E95.D.426","volume":"95","author":"H Hata","year":"2012","unstructured":"Hata, H., Ichikawa, S.: FPGA implementation of metastability-based true random number generator. IEICE Trans. 95(D\u20132), 426\u2013436 (2012)","journal-title":"IEICE Trans."},{"key":"91_CR12","doi-asserted-by":"crossref","unstructured":"Helfmeier, C., Boit, C., Nedospasov, D., Seifert, J.P.: Cloning physically unclonable functions. In: HOST (2013)","DOI":"10.1109\/HST.2013.6581556"},{"key":"91_CR13","unstructured":"Holcomb, D.E., Burleson, W.P., Fu, K.: Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Proceedings of the Conference on RFID Security (2007)"},{"key":"91_CR14","doi-asserted-by":"crossref","unstructured":"Holcomb, D.E., Rahmati, A., Salajegheh, M., Burleson, W.P., Fu, K.: DRV-fingerprinting: using data retention voltage of SRAM cells for chip identification. In: RFIDSec, pp. 165\u2013179 (2012)","DOI":"10.1007\/978-3-642-36140-1_12"},{"key":"91_CR15","doi-asserted-by":"crossref","unstructured":"Ignatenko, T., Schrijen, G.J., Skoric, B., Tuyls, P., Willems, F.: Estimating the secrecy-rate of physical unclonable functions with the context-tree weighting method. In: Information Theory, 2006 IEEE International Symposium on, pp. 499\u2013503 (2006)","DOI":"10.1109\/ISIT.2006.261765"},{"key":"91_CR16","doi-asserted-by":"crossref","unstructured":"Krishna, A.R., Narasimhan, S., Wang, X., Bhunia, S.: Mecca: a robust low-overhead PUF using embedded memory array. In: CHES, pp. 407\u2013420 (2011)","DOI":"10.1007\/978-3-642-23951-9_27"},{"key":"91_CR17","doi-asserted-by":"crossref","unstructured":"Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.J., Tuyls, P.: Extended abstract: the Butterfly PUF: protecting IP on every FPGA. In: HOST, pp. 67\u201370 (2008)","DOI":"10.1109\/HST.2008.4559053"},{"key":"91_CR18","doi-asserted-by":"crossref","unstructured":"Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., S.Devadas: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proceedings of the IEEE VLSI Circuits Symposium, pp. 176\u2013179 (2004)","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"91_CR19","unstructured":"Ltd., F.S.: CS86 technology. http:\/\/www.fujitsu.com\/downloads\/MICRO\/fma\/pdf\/e620209_CS86_ASIC.pdf"},{"key":"91_CR20","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic PUFs from flip-flops on reconfigurable devices. In: 3rd Benelux Workshop on Information and system security (WISSec 2008), p. 17 (2008)"},{"key":"91_CR21","doi-asserted-by":"crossref","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs. CHES pp. 332\u2013347 (2009)","DOI":"10.1007\/978-3-642-04138-9_24"},{"key":"91_CR22","doi-asserted-by":"crossref","unstructured":"Maes, R., Verbauwhede, I.: Physically unclonable functions: a study on the state of the art and future research directions. In: Towards hardware intrinsic security: foundation and practice, pp. 3\u201337. Springer (2010)","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"91_CR23","doi-asserted-by":"crossref","unstructured":"Maiti, A., Gunreddy, V., Schaumont, P.: A systematic method to evaluate and compare the performance of physical unclonable functions. In: Embedded systems design with FPGAs, pp. 245\u2013267. Springer, New York (2013)","DOI":"10.1007\/978-1-4614-1362-2_11"},{"key":"91_CR24","unstructured":"Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., Byers, A.H.: Big data: the next frontier for innovation, competition, and productivity. Tech. rep, McKinsey Global Institute (2011)"},{"issue":"3","key":"91_CR25","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"UM Maurer","year":"1993","unstructured":"Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39(3), 733\u2013742 (1993)","journal-title":"IEEE Trans Inf Theory"},{"key":"91_CR26","unstructured":"Pappu, R.S.: Physical one-way functions. Ph. D. thesis, Massachusetts Institute of Technology (2001)"},{"key":"91_CR27","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM conference on Computer and communications security, CCS 2010, pp. 237\u2013249 (2010)","DOI":"10.1145\/1866307.1866335"},{"key":"91_CR28","doi-asserted-by":"crossref","unstructured":"Simons, P., van der Sluis, E., van der Leest, V.: Buskeeper PUFs, a promising alternative to D Flip-Flop PUFs. In: Hardware-Oriented Security and Trust (HOST), 2012 IEEE International Symposium on, pp. 7\u201312 (2012)","DOI":"10.1109\/HST.2012.6224311"},{"key":"91_CR29","doi-asserted-by":"crossref","unstructured":"Su, Y., Holleman, J., Otis, B.: A 1.6pJ\/bit 96% stable chip-ID generating circuit using process variations. In: IEEE International Solid-State Circuits Conference\u2014ISSCC 2007. IEEE, pp. 406\u2013611 (2007)","DOI":"10.1109\/ISSCC.2007.373466"},{"key":"91_CR30","doi-asserted-by":"crossref","unstructured":"Su, Y., Holleman, J., Otis, B.P.: A digital 1.6pJ\/bit chip identification circuit using process variations. Solid-State Circuits IEEE J. 43(1), 69\u201377 (2008)","DOI":"10.1109\/JSSC.2007.910961"},{"key":"91_CR31","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of DAC pp. 9\u201314 (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"91_CR32","doi-asserted-by":"crossref","unstructured":"Torrance, R., James, D.: The state-of-the-art in IC reverse engineering. In: CHES, pp. 363\u2013381 (2009)","DOI":"10.1007\/978-3-642-04138-9_26"},{"key":"91_CR33","doi-asserted-by":"crossref","unstructured":"Tuyls, P., Schrijen, G.J., Skoric, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-proof hardware from protective coatings. In: CHES, pp. 369\u2013383 (2006)","DOI":"10.1007\/11894063_29"},{"key":"91_CR34","unstructured":"Xilinx: Spartan-3E starter kit board. http:\/\/www.xilinx.com\/products\/boards-and-kits\/hw-spar3e-sk-us-g.html"},{"key":"91_CR35","doi-asserted-by":"crossref","unstructured":"Yamamoto, D., Sakiyama, K., Iwamoto, M., Ohta, K., Takenaka, M., Itoh, K.: Variety enhancement of PUF responses using the locations of random outputting RS latches. J Cryptogr Eng 3(4), 197\u2013211 (2013)","DOI":"10.1007\/s13389-012-0044-0"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-014-0091-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-014-0091-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-014-0091-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T22:00:12Z","timestamp":1566079212000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-014-0091-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,25]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["91"],"URL":"https:\/\/doi.org\/10.1007\/s13389-014-0091-9","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,25]]}}}