{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T03:57:03Z","timestamp":1773201423932,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T00:00:00Z","timestamp":1636416000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T00:00:00Z","timestamp":1636416000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s41635-021-00120-6","type":"journal-article","created":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T11:02:57Z","timestamp":1636455777000},"page":"247-259","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Design and Analysis of Reconfigurable Cryptographic Primitives: TRNG and PUF"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0284-0823","authenticated-orcid":false,"given":"Vikash Kumar","family":"Rai","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]},{"given":"Jimson","family":"Mathew","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,9]]},"reference":[{"key":"120_CR1","doi-asserted-by":"crossref","unstructured":"Gassend B et al (2002) Controlled physical random functions. In: Proceedings of the 18th an nual computer security applications conference. ACSAC \u201902. IEEE Computer Society, Washington, p 149. ISBN: 0-7695-1828-1. http:\/\/dl.acm.org\/citation.cfm?id=784592.784802","DOI":"10.1109\/CSAC.2002.1176287"},{"key":"120_CR2","doi-asserted-by":"crossref","unstructured":"Gassend B et al (2002) Silicon physical random functions. In: Proceedings of the 9th ACM conference on computer and communications security. ACM, pp 148\u2013160","DOI":"10.1145\/586110.586132"},{"key":"120_CR3","doi-asserted-by":"crossref","unstructured":"Lee JW et al (2004) A technique to build a secret key in integrated circuits for identification and authentication applications. In: 2004 symposium on VLSI circuits. Digest of technical papers (IEEE cat. no. 04CH37525). IEEE, pp 176\u2013179","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"120_CR4","doi-asserted-by":"crossref","unstructured":"Suh GE, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: 2007 44th ACM\/IEEE design automation conference. IEEE, pp 9\u201314","DOI":"10.1109\/DAC.2007.375043"},{"issue":"10","key":"120_CR5","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D Lim","year":"2005","unstructured":"Lim D et al (2005) Extracting secret keys from integrated circuits. IEEE Trans Very Large Scale Integr VLSI Syst 13(10):1200\u20131205","journal-title":"IEEE Trans Very Large Scale Integr VLSI Syst"},{"key":"120_CR6","doi-asserted-by":"crossref","unstructured":"Anderson JH (2010) A PUF design for secure FPGA-based embedded systems. In: Proceedings of the 2010 Asia and South Pacific design automation conference. IEEE Press, pp 1\u20136","DOI":"10.1109\/ASPDAC.2010.5419927"},{"issue":"9","key":"120_CR7","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1109\/TC.2008.212","volume":"58","author":"DE Holcomb","year":"2008","unstructured":"Holcomb DE, Burleson WP, Kevin F (2008) Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans Comput 58(9):1198\u20131210","journal-title":"IEEE Trans Comput"},{"key":"120_CR8","unstructured":"Holcomb DE, Burleson WP, Kevin F et al (2007) Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Proceedings of the conference on RFID security, vol 7, p 01"},{"key":"120_CR9","doi-asserted-by":"crossref","unstructured":"Roel M, Pim T, Verbauwhede I (2009) Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs. In: International workshop on cryptographic hardware and embedded systems. Springer, pp 332\u2013 347","DOI":"10.1007\/978-3-642-04138-9_24"},{"key":"120_CR10","doi-asserted-by":"crossref","unstructured":"Fischer V (2012) A closer look at security in random number generators design. In: International workshop on constructive side-channel analysis and secure design. Springer, pp 167\u2013182","DOI":"10.1007\/978-3-642-29912-4_13"},{"issue":"1","key":"120_CR11","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"M James","year":"1969","unstructured":"James M (1969) Shift-register synthesis and BCH decoding. IEEE Trans Inf Theory 15(1):122\u2013127","journal-title":"IEEE Trans Inf Theory"},{"key":"120_CR12","unstructured":"Killmann W, Schindler W (2011) A proposal for: functionality classes for random number generators. In: Ser. BDI, Bonn"},{"key":"120_CR13","doi-asserted-by":"crossref","unstructured":"Maiti A, Gunreddy V, Schaumont P (2013) A systematic method to evaluate and compare the performance of physical unclonable functions. In: Embedded systems design with FPGAs. Springer, pp 245\u2013267","DOI":"10.1007\/978-1-4614-1362-2_11"},{"issue":"1","key":"120_CR14","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/JSSC.2007.910961","volume":"43","author":"Y Su","year":"2008","unstructured":"Su Y, Holleman J, Otis BP (2008) A digital 1.6 pJ\/bit chip identification circuit using process variations. IEEE J Solid-State Circuits 43(1):69\u201377","journal-title":"IEEE J Solid-State Circuits"},{"issue":"1","key":"120_CR15","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/TC.2007.250627","volume":"56","author":"B Sunar","year":"2006","unstructured":"Sunar B, Martin WJ, Stinson DR (2006) A provably secure true random number generator with built-in tolerance to active attacks. IEEE Trans Comput 56(1):109\u2013119","journal-title":"IEEE Trans Comput"},{"key":"120_CR16","first-page":"4","volume":"12","author":"K Wold","year":"2009","unstructured":"Wold K, Tan CH (2009) Analysis and enhancement of random number generator in FPGA based on oscillator rings. Int J Reconf Comput 12:4","journal-title":"Int J Reconf Comput"},{"issue":"1","key":"120_CR17","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TCSI.2017.2711033","volume":"65","author":"H Martin","year":"2017","unstructured":"Martin H, Di Natale G, Entrena L (2017) Towards a dependable true random number generator with self-repair capabilities. IEEE Trans Circuits Syst I Regul Pap 65(1):247\u2013256","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"120_CR18","doi-asserted-by":"crossref","unstructured":"Chari SN et al (2010) Designing a side channel resistant random number generator. In: Inter- national conference on smart card research and advanced applications. Springer, pp 49\u201364","DOI":"10.1007\/978-3-642-12510-2_5"},{"key":"120_CR19","unstructured":"Hashim NABN et al (2016) Implementing memristor in ring oscillators based random number generator. In: 2016 IEEE student conference on research and development (SCOReD). IEEE, pp 1\u20135"},{"key":"120_CR20","doi-asserted-by":"crossref","unstructured":"Wang Y et al (2015) A novel true random number generator design leveraging emerging memristor technology. In: Proceedings of the 25th edition on great lakes symposium on VLSI. ACM, pp 271\u2013276","DOI":"10.1145\/2742060.2742088"},{"issue":"1","key":"120_CR21","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/272991.272995","volume":"8","author":"M Matsumoto","year":"1998","unstructured":"Matsumoto M, Nishimura T (1998) Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. Trans Model Comput Simul 8(1):3\u201330. https:\/\/doi.org\/10.1145\/272991.272995","journal-title":"Trans Model Comput Simul"},{"key":"120_CR22","doi-asserted-by":"crossref","unstructured":"Maiti A et al (2010) A large scale characterization of RO-PUF. In: 2010 IEEE international symposium on hardware-oriented security and trust (HOST). IEEE, pp 94\u201399","DOI":"10.1109\/HST.2010.5513108"},{"key":"120_CR23","doi-asserted-by":"crossref","unstructured":"Devadas S et al (2008) Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications. In: 2008 IEEE international conference on RFID. IEEE, pp 58\u201364","DOI":"10.1109\/RFID.2008.4519377"},{"key":"120_CR24","doi-asserted-by":"crossref","unstructured":"Tehranipoor F et al (2015) DRAM based intrinsic physical unclonable functions for system level security. In: Proceedings of the 25th edition on great lakes symposium on VLSI. ACM, pp 15\u201320","DOI":"10.1145\/2742060.2742069"},{"key":"120_CR25","doi-asserted-by":"publisher","unstructured":"Rose GS et al (2013) Foundations of memristor based PUF architectures. In: 2013 IEEE\/ACM international symposium on nanoscale architectures (NANOARCH), pp 52\u201357. https:\/\/doi.org\/10.1109\/NanoArch.2013.6623044","DOI":"10.1109\/NanoArch.2013.6623044"},{"key":"120_CR26","doi-asserted-by":"crossref","unstructured":"Guajardo J et al (2007) FPGA intrinsic PUFs and their use for IP protection. In: International workshop on cryptographic hardware and embedded systems. Springer, pp 63\u201380","DOI":"10.1007\/978-3-540-74735-2_5"},{"issue":"7191","key":"120_CR27","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1038\/nature06932","volume":"453","author":"DB Strukov","year":"2008","unstructured":"Strukov DB et al (2008) The missing memristor found. Nature 453(7191):80","journal-title":"Nature"},{"key":"120_CR28","unstructured":"Kavehei O et al (2013) mrPUF: a memristive device based physical unclonable function. arXiv:1302.2191"},{"key":"120_CR29","doi-asserted-by":"crossref","unstructured":"Koeberl P, Kocaba\u015f \u00dcnal, SA-R (2013) Memristor PUFs: a new generation of memory-based physically unclonable functions. In: Proceedings of the conference on design, automation and test in Europe. DATE \u201913. Grenoble, France: EDA Consortium, pp 428\u2013431. ISBN: 978-1-4503-2153-2. http:\/\/dl.acm.org\/citation.cfm?id=2485288.2485390","DOI":"10.7873\/DATE.2013.096"},{"key":"120_CR30","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.vlsi.2015.05.005","volume":"51","author":"M Jimson","year":"2015","unstructured":"Jimson M et al (2015) A novel memristor based physically unclonable function. Integr VLSI J 51:37\u201345","journal-title":"Integr VLSI J"},{"issue":"8","key":"120_CR31","doi-asserted-by":"publisher","first-page":"7025","DOI":"10.1109\/TIE.2019.2938462","volume":"67","author":"J Zhang","year":"2019","unstructured":"Zhang J, Gang Q (2019) Physical unclonable function-based key sharing via machine learning for IoT security. IEEE Trans Ind Electr 67(8):7025\u20137033","journal-title":"IEEE Trans Ind Electr"},{"key":"120_CR32","doi-asserted-by":"crossref","unstructured":"Lao Y, Parhi KK (2011) Reconfigurable architectures for silicon physical unclonable functions. In: 2011 IEEE international conference on electro\/information technology. IEEE, pp 1\u20137","DOI":"10.1109\/EIT.2011.5978614"},{"issue":"2","key":"120_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2699833","volume":"20","author":"J Zhang","year":"2015","unstructured":"Zhang J, Lin Y, Gang Q (2015) Recon- figurable binding against FPGA replay attacks. ACM Trans Des Autom Electr Syst TODAES 20(2):1\u201320","journal-title":"ACM Trans Des Autom Electr Syst TODAES"},{"key":"120_CR34","doi-asserted-by":"crossref","unstructured":"Gao M, Lai K, Qu G (2014) A highly exible ring oscillator PUF. In: Proceedings of the 51st annual design automation conference, pp 1\u20136","DOI":"10.1145\/2593069.2593072"},{"key":"120_CR35","doi-asserted-by":"crossref","unstructured":"Eichhorn I, Koeberl P, van der Leest V (2011) Logically reconfigurable PUFs: memory based secure key storage. In: Proceedings of the sixth ACM workshop on scalable trusted computing, pp 59\u201364","DOI":"10.1145\/2046582.2046594"},{"key":"120_CR36","doi-asserted-by":"publisher","first-page":"104605","DOI":"10.1016\/j.mejo.2019.104605","volume":"92","author":"S Khan","year":"2019","unstructured":"Khan S et al (2019) An ultra-low power, recon- figurable, aging resilient RO PUF for IoT applications. Microelectron J 92:104605","journal-title":"Microelectron J"},{"issue":"3","key":"120_CR37","first-page":"25","volume":"18","author":"W Liu","year":"2019","unstructured":"Liu W et al (2019) XOR-based low-cost Reconfigurable PUFs for IoT Security. ACM Trans Embed Comput Syst TECS 18(3):25","journal-title":"ACM Trans Embed Comput Syst TECS"},{"key":"120_CR38","doi-asserted-by":"crossref","unstructured":"Buchoveck\u00e1 S et al (2016) True random number generator based on ROPUF circuit. In: 2016 Euromicro conference on digital system design (DSD). IEEE, pp 519\u2013523","DOI":"10.1109\/DSD.2016.36"},{"key":"120_CR39","doi-asserted-by":"crossref","unstructured":"Kalanadhabhatta S et al ((2020)) PUF-based secure chaotic random number generator design methodology. In: IEEE transactions on very large scale integration (VLSI) systems","DOI":"10.1109\/TVLSI.2020.2979269"},{"key":"120_CR40","doi-asserted-by":"crossref","unstructured":"Rukhin A et al (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report Booz-Allen and Hamilton Inc Mclean Va","DOI":"10.6028\/NIST.SP.800-22"},{"issue":"3","key":"120_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v007.i03","volume":"7","author":"G Marsaglia","year":"2002","unstructured":"Marsaglia G, Tsang WW et al (2002) Some difficult-to-pass tests of randomness. J Stat Softw 7(3):1\u20139","journal-title":"J Stat Softw"},{"key":"120_CR42","doi-asserted-by":"crossref","unstructured":"Hori Y et al (2010) Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs. In: 2010 international conference on reconfigurable computing and FP-GAs. IEEE, pp 298\u2013303","DOI":"10.1109\/ReConFig.2010.24"},{"key":"120_CR43","unstructured":"Sahoo DP et al (2016) On the architectural analysis of arbiter delay PUF variants. Cryptology ePrint Archive, Report 2016\/057. https:\/\/eprint.iacr.org\/2016\/057"},{"key":"120_CR44","doi-asserted-by":"crossref","unstructured":"Karpinskyy B et al (2016) 8.7 Physically unclonable function for secure key generation with a key error rate of 2E-38 in 45 nm smart-card chips. In: 2016 IEEE international solid-state circuits conference (ISSCC). IEEE, pp 158\u2013160","DOI":"10.1109\/ISSCC.2016.7417955"},{"key":"120_CR45","doi-asserted-by":"crossref","unstructured":"Srinivasan S et al (2009) A 4 gbps 0.57 pj\/bit process voltage-temperature variation tolerant all-digital true random number generator in 45 nm CMOS. In: 2009 22nd international conference on VLSI design. IEEE, pp 301\u2013306","DOI":"10.1109\/VLSI.Design.2009.69"},{"key":"120_CR46","doi-asserted-by":"crossref","unstructured":"Wang Q, Gao M, Qu G (2018) A Machine learning attack resistant dual-mode PUF. In: Proceedings of the 2018 on great lakes symposium on VLSI. ACM, pp 177\u2013182","DOI":"10.1145\/3194554.3194590"},{"key":"120_CR47","doi-asserted-by":"crossref","unstructured":"Dubrova E et al (2019) CRC-PUF: a machine learning attack resistant lightweight PUF construction. In: 2019 IEEE European symposium on security and privacy workshops (EuroS&PW). IEEE, pp 264\u2013271","DOI":"10.1109\/EuroSPW.2019.00036"},{"key":"120_CR48","doi-asserted-by":"crossref","unstructured":"Cherif Z et al (2012) An easy-to-design PUF based on a single oscillator: the loop PUF. In: 2012 15th Euromicro conference on digital system design. IEEE, pp 156\u2013162","DOI":"10.1109\/DSD.2012.22"},{"issue":"4","key":"120_CR49","doi-asserted-by":"publisher","first-page":"1022","DOI":"10.1109\/JSSC.2016.2519383","volume":"51","author":"K Yang","year":"2016","unstructured":"Yang K, Blaauw D, Sylvester D (2016) An all-digital edge racing true random number generator robust against PVT variations. IEEE J Solid-State Circuits 51(4):1022\u20131031","journal-title":"IEEE J Solid-State Circuits"},{"issue":"6","key":"120_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSTQE.2018.2814787","volume":"24","author":"F Acerbi","year":"2018","unstructured":"Acerbi F et al (2018) A robust quantum random number generator based on an integrated emitter-photodetector structure. IEEE J Sel Top Quantum Electron 24(6):1\u20137","journal-title":"IEEE J Sel Top Quantum Electron"},{"issue":"6","key":"120_CR51","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1109\/TCSII.2016.2530800","volume":"63","author":"D Liu","year":"2016","unstructured":"Liu D et al (2016) A low-cost low-power ring oscillator-based truly random number generator for encryption on smart cards. IEEE Trans Circuits Syst II Express Briefs 63(6):608\u2013612","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"issue":"1","key":"120_CR52","doi-asserted-by":"publisher","first-page":"8","DOI":"10.3390\/cryptography1010008","volume":"1","author":"W Che","year":"2017","unstructured":"Che W et al (2017) Analysis of entropy in a hardware embedded delay PUF. Cryptography 1(1):8","journal-title":"Cryptography"},{"issue":"4","key":"120_CR53","doi-asserted-by":"publisher","first-page":"2887","DOI":"10.1007\/s11071-020-06017-3","volume":"102","author":"N Nguyen","year":"2020","unstructured":"Nguyen N et al (2020) A fully CMOS true random number generator based on hidden attractor hyperchaotic system. Nonlinear Dyn 102(4):2887\u20132904","journal-title":"Nonlinear Dyn"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-021-00120-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41635-021-00120-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-021-00120-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T11:04:47Z","timestamp":1638443087000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41635-021-00120-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,9]]},"references-count":53,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["120"],"URL":"https:\/\/doi.org\/10.1007\/s41635-021-00120-6","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"value":"2509-3428","type":"print"},{"value":"2509-3436","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,9]]},"assertion":[{"value":"19 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}