{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T12:47:25Z","timestamp":1772542045277,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s41635-017-0012-3","type":"journal-article","created":{"date-parts":[[2017,9,5]],"date-time":"2017-09-05T18:52:01Z","timestamp":1504637521000},"page":"137-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Systematic Correlation and Cell Neighborhood Analysis of SRAM PUF for Robust and Unique Key Generation"],"prefix":"10.1007","volume":"1","author":[{"given":"M. Tauhidur","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Alison","family":"Hosey","sequence":"additional","affiliation":[]},{"given":"Zimu","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Jackson","family":"Carroll","sequence":"additional","affiliation":[]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,5]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Tauhidur Rahman M et al (2014) CSST: preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly. In: IEEE Int. symposium on defect and fault tolerance symposium (DFTS)","DOI":"10.1109\/DFT.2014.6962096"},{"key":"12_CR2","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","volume":"102","author":"C Herder","year":"2014","unstructured":"Herder C et al (2014) Physical unclonable functions and applications: a tutorial. Proc IEEE 102:1126\u20131141","journal-title":"Proc IEEE"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Maes R et al (2010) Physically unclonable functions: a study on the state of the art and future research directions, section 1. towards hardware-intrinsic security. Springer","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Eiroa S et al (2012) Reducing bit flipping problems in SRAM physical unclonable functions for chip identification. In: 19th IEEE int. conf. on electronics, circuits and systems (ICECS), pp 392\u2013395","DOI":"10.1109\/ICECS.2012.6463720"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Holcomb D et al (2009) Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans Comput","DOI":"10.1109\/TC.2008.212"},{"issue":"1","key":"12_CR6","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/JSSC.2007.910961","volume":"43","author":"Y Su","year":"2008","unstructured":"Su Y et al (2008) A digital 1.6 pJ\/Bit chip identification circuit using process variations. IEEE J Solid-State Circ 43(1):69\u201377","journal-title":"IEEE J Solid-State Circ"},{"issue":"1","key":"12_CR7","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MDT.2010.25","volume":"27","author":"M Yu","year":"2010","unstructured":"Yu M, Devadas S (2010) Secure and robust error correction for physical unclonable functions. IEEE Des Test Comput 27(1): 48\u201365","journal-title":"IEEE Des Test Comput"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Xiao K et al (2014) Bit selection algorithm suitable for high-volume production of SRAM-PUF. IEEE Int Symp Hardware-Oriented Secur Trust, pp 101","DOI":"10.1109\/HST.2014.6855578"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Hosey A et al (2014) Advanced analysis of cell stability for reliable SRAM PUFs. In: 2014 IEEE 23rd Asian test symposium (ATS), pp 348\u2013353","DOI":"10.1109\/ATS.2014.70"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Maes R et al (2009) A soft decision helper data algorithm for SRAM PUFs. In: ISIT 2009 IEEE International symposium on information theory, pp 2101\u20132105","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"van der Leest V et al (2012) Soft decision error correction for compact memory-based PUFs using a single enrollment. In: Cryptographic hardware and embedded systems, CHES 2012, volume 7428 of LNCS. Springer, Berlin, pp 268\u2013282","DOI":"10.1007\/978-3-642-33027-8_16"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Maes R, van der Leest V (2014) Countering the effects of silicon aging on SRAM PUFs. In: 2014 IEEE International symposium on hardware-oriented security and trust (HOST), pp 148\u2013 153","DOI":"10.1109\/HST.2014.6855586"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Hofer M, et al. (2010) An alternative to error correction for sram-like pufs. Cryptograph Hardware Embedded Syst 335\u2013350","DOI":"10.1007\/978-3-642-15031-9_23"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Garg A, Kim TT (2014) Design of SRAM PUF with improved uniformity and reliability utilizing device aging effect. In: IEEE International symposium on circuits and systems (ISCAS), pp 1941\u20131944","DOI":"10.1109\/ISCAS.2014.6865541"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Zheng Y et al (2013) RESP: a robust physical unclonable function retrofitted into embedded SRAM array. In: 50th ACM\/IEEE design automation conference (DAC)","DOI":"10.1145\/2463209.2488807"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Bhargava M et al (2012) Reliability enhancement of bi-stable PUFs in 65nm bulk CMOS. In: IEEE Intl symposium on hardware-oriented security trust (HOST)","DOI":"10.1109\/HST.2012.6224314"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Cortez M et al (2013) Adapting voltage ramp-up time for temperature noise reduction on memory-based PUFs. In: IEEE Intl symposium on hardwareoriented security trust (HOST)","DOI":"10.1109\/HST.2013.6581562"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Tauhidur Rahman M et al (2015) A pair selection algorithm for robust RO-PUF against environmental variations and aging. In: IEEE International conference on computer design (ICCD)","DOI":"10.1109\/ICCD.2015.7357137"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Tauhidur Rahman M et al (2014) TI-TRNG: technology independent true random number generator. In: Proceedings of the the 51st annual design automation conference on design automation conference (DAC), pp 179:1\u2013179:6","DOI":"10.1145\/2593069.2593236"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Merl D et al (2011) Side-channel analysis of PUFs and fuzzy extractors. In: McCune J M, Balacheff B, Perrig A, Sadeghi A-R, Sasse A, Beres Y (eds) Trust and trustworthy computing (TRUST), ser. LNCS, vol 6740. Springer, pp 33\u201347","DOI":"10.1007\/978-3-642-21599-5_3"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Xu SQ et al (2014) Understanding sources of variations in flash memory for physical unclonable functions. In: IEEE 6th international memory workshop, pp 1\u20134","DOI":"10.1109\/IMW.2014.6849385"},{"issue":"2","key":"12_CR22","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/JETCAS.2015.2435532","volume":"5","author":"A Mazady","year":"2015","unstructured":"Mazady A et al (2015) Memristor PUF\u2013a security primitive: theory and experiment. IEEE J Emerging Select Topics Circ Syst 5(2):222\u2013229","journal-title":"IEEE J Emerging Select Topics Circ Syst"},{"issue":"99","key":"12_CR23","first-page":"1","volume":"PP","author":"M Tauhidur Rahman","year":"2016","unstructured":"Tauhidur Rahman M et al (2016) An aging-resistant RO-PUF for reliable key generation. IEEE Trans Emerg Topics Comput PP(99):1","journal-title":"IEEE Trans Emerg Topics Comput"},{"issue":"1","key":"12_CR24","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TSM.2007.913186","volume":"21","author":"SR Sarangi","year":"2008","unstructured":"Sarangi SR et al (2008) VARIUS: a model of process variation and resulting timing errors for microarchitects. IEEE Trans Semicond Manuf 21(1):3\u201313","journal-title":"IEEE Trans Semicond Manuf"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Onabajo M, Silva-Martinez J (2012) Process variation challenges and solutions approaches. In: Analog circuit design for process variation-resilient systems-on-a-chip, p 930","DOI":"10.1007\/978-1-4614-2296-9_2"},{"key":"12_CR26","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/54.980050","volume":"19","author":"C Aktouf","year":"2002","unstructured":"Aktouf C (2002) A complete strategy for testing an on-chip multiprocessor architecture. Des Test Comput 19:18","journal-title":"Des Test Comput"},{"key":"12_CR27","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1109\/TIM.2012.2211472","volume":"61","author":"J Bae","year":"2012","unstructured":"Bae J et al (2012) Characterizing the capacitive crosstalk in SRAM cells using negative bit-line voltage stress. IEEE Trans Instrum Measur 61:3259\u20133272","journal-title":"IEEE Trans Instrum Measur"},{"issue":"1","key":"12_CR28","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/66.554480","volume":"10","author":"BE Stine","year":"1997","unstructured":"Stine BE et al (1997) Analysis and decomposition of spatial variation in integrated circuit processes and devices. IEEE Trans Semicond Manuf 10(1):24\u201341","journal-title":"IEEE Trans Semicond Manuf"},{"key":"12_CR29","unstructured":"Rukhin A et al (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22 Rev1a"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Maiti A et al (2013) A systematic method to evaluate and compare the performance of physical unclonable functions. In: Athanas P, Pnevmatikatos D, Sklavos N (eds) Embedded systems design with FPGAs. Springer, New York, pp 245\u2013267","DOI":"10.1007\/978-1-4614-1362-2_11"},{"key":"12_CR31","unstructured":"Delvaux J, Verbauwhede I (2014) Key-recovery attacks on various RO PUF constructions via helper data manipulation. In: Design, automation & test in europe conference & exhibition, DATE 2014. Dresden, p 16"},{"key":"12_CR32","unstructured":"Merli D et al (2013) Protecting PUF error correction by codeword masking. In: Proc. IACR cryptology eprint archive. Buenos Aires, p 334"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Hiller M et al (2013) Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes. In: Proceedings of the 3rd international workshop on trustworthy embedded devices, pp 04\u201304","DOI":"10.1145\/2517300.2517304"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Armknecht F et al (2009) Memory leakage-resilient encryption based on physically unclonable functions. In: Advances in cryptology (ASIACRYPT), ser. LNCS, vol 5912, pp 685\u2013702","DOI":"10.1007\/978-3-642-10366-7_40"},{"key":"12_CR35","unstructured":"Dodis Y et al (2004) Fuzzy extractors: how to generate strong keys from biom etrics and other noisy data. In: Proc. Eurocrypt, pp 523\u2013540"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Maes R et al Secure key generation from biased PUFs. In: Proc. Cryptographic hardware and embedded systems, CHES 2015, vol 9293 of LNCS, pp 517\u2013534","DOI":"10.1007\/978-3-662-48324-4_26"},{"key":"12_CR37","doi-asserted-by":"crossref","unstructured":"Van Herrewege A et al (2013) DEMO: inherent PUFs and secure PRNGs on commercial off-the-shelf microcontrollers. In: Proceedings of the 2013 ACM SIGSAC conference on computer communications security. Hangzhou, pp 1333\u20131336","DOI":"10.1145\/2508859.2512493"},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Schrijen GJ, van der Leest V Comparative analysis of sram memories used as puf primitives. In: Proceedings of the conference on design, automation and test in Europe, pp 1319\u20131324","DOI":"10.1109\/DATE.2012.6176696"},{"key":"12_CR39","doi-asserted-by":"crossref","unstructured":"Dogan H et al Aging analysis for recycled fpga detection. In: 2014 IEEE international symposium on defect and fault tolerance in VLSI and nanotechnology systems (DFT), pp 171\u2013176","DOI":"10.1109\/DFT.2014.6962099"},{"key":"12_CR40","doi-asserted-by":"crossref","unstructured":"Koeberl P et al Entropy loss in PUF-based key generation schemes: the repetition code pitfall. In: Proc. Int. symp. hardw.-orient. security trust (HOST), pp 44\u201349","DOI":"10.1109\/HST.2014.6855566"},{"key":"12_CR41","unstructured":"Herder C et al Trapdoor computational fuzzy extractors, [Online]. Cryptology ePrint Archive, Rep. 2014\/938. Available: http:\/\/eprint.iacr.org\/"},{"key":"12_CR42","doi-asserted-by":"crossref","unstructured":"Maes R et al (2012) PUFKY: a fully functional PUF-based cryptographic key generator. In: Proceedings of the 14th international conference on cryptographic hardware and embedded systems, pp 302\u2013319","DOI":"10.1007\/978-3-642-33027-8_18"},{"key":"12_CR43","doi-asserted-by":"crossref","unstructured":"Suzuki D, Shimizu K (2010) The glitch PUF: a new delay-PUF architecture exploiting glitch shapes. In: Cryptographic hardware and embedded systems, pp 366\u2013382","DOI":"10.1007\/978-3-642-15031-9_25"},{"key":"12_CR44","doi-asserted-by":"crossref","unstructured":"Chuang C-T et al (2007) High-performance SRAM in nanoscale CMOS: design challenges and techniques. In: 2007 IEEE international workshop on memory technology, design and testing. Taipei, pp 4\u201312","DOI":"10.1109\/MTDT.2007.4547603"},{"issue":"6","key":"12_CR45","doi-asserted-by":"crossref","first-page":"903","DOI":"10.1109\/TCAD.2015.2418288","volume":"34","author":"X Xu","year":"2015","unstructured":"Xu X (2015) Reliable physical unclonable functions using data retention voltage of SRAM cells. IEEE Trans Comput-Aided Des Integr Circ Syst 34(6):903\u2013914","journal-title":"IEEE Trans Comput-Aided Des Integr Circ Syst"},{"issue":"99","key":"12_CR46","first-page":"1","volume":"PP","author":"J Kinseher","year":"2016","unstructured":"Kinseher J et al (2016) Improving testability and reliability of advanced SRAM architectures. IEEE Trans Emerg Topics Comput PP(99):1\u20131","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"12_CR47","doi-asserted-by":"crossref","unstructured":"Vijayakumar A et al (2016) On testing physically unclonable functions for uniqueness. In: 2016 17th International symposium on quality electronic design (ISQED), pp 368\u2013373","DOI":"10.1109\/ISQED.2016.7479229"},{"key":"12_CR48","doi-asserted-by":"crossref","unstructured":"Sumikawa N et al (2012) An experiment of burn-in time reduction based on parametric test analysis. Proc Intl Test Conf 1\u20131","DOI":"10.1109\/TEST.2012.6401595"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-017-0012-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0012-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0012-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T15:50:28Z","timestamp":1750866628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-017-0012-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["12"],"URL":"https:\/\/doi.org\/10.1007\/s41635-017-0012-3","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"value":"2509-3428","type":"print"},{"value":"2509-3436","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6]]}}}