{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:45:53Z","timestamp":1764240353196,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T00:00:00Z","timestamp":1597104000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T00:00:00Z","timestamp":1597104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"ANR","award":["ANR-10-AIRT-05"],"award-info":[{"award-number":["ANR-10-AIRT-05"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s42979-020-00274-0","type":"journal-article","created":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T13:03:48Z","timestamp":1597151028000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Conception and Evaluation of Secure Circuits for Strong Digital PUF"],"prefix":"10.1007","volume":"1","author":[{"given":"Johan","family":"Marconot","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3249-7667","authenticated-orcid":false,"given":"David","family":"Hely","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Pebay-Peyroula","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,11]]},"reference":[{"key":"274_CR1","volume-title":"Extracting secret keys from integrated circuits","author":"D Lim","year":"2004","unstructured":"Lim D. Extracting secret keys from integrated circuits. Boston: Massachusetts Institute of Technology; 2004."},{"key":"274_CR2","unstructured":"B. Gassend. Physical random functions. M.S. thesis, Massachusetts Institute of Technology, 2003."},{"issue":"11","key":"274_CR3","doi-asserted-by":"publisher","first-page":"011303","DOI":"10.1063\/1.5079407","volume":"6","author":"T McGrath","year":"2019","unstructured":"McGrath T, Bagci I, Wang Z, Roedig U, Young R. A PUF taxonomy. Appl Phys Rev. 2019;6(11):011303.","journal-title":"Appl Phys Rev"},{"key":"274_CR4","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-1-4614-5040-5_2","volume-title":"Physical unclonable functions in theory and practice, Graz University of Technology, Austria","author":"C B\u00f6hm","year":"2013","unstructured":"B\u00f6hm C, Hofer M. Chapter 2: Use cases and Chapter 3: Applications. Physical unclonable functions in theory and practice, Graz University of Technology, Austria. Wien: Springer; 2013. p. 39\u201368."},{"key":"274_CR5","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-319-76804-5_4","volume-title":"Physically unclonable functions","author":"B Halak","year":"2018","unstructured":"Halak B. Chapter 4: reliability enhancement techniques for physically unclonable functions. Physically unclonable functions. Southampton: Springer; 2018. p. 73\u2013128."},{"issue":"18","key":"274_CR6","doi-asserted-by":"publisher","first-page":"1988","DOI":"10.1109\/TIFS.2017.2689726","volume":"12","author":"B Colombier","year":"2017","unstructured":"Colombier B, Bossuet L, Fischer V, H\u00e9ly D. Key reconcialiation protocols for error correction of silicon PUF responses. IEEE Trans Inform Forensics Secur. 2017;12(18):1988\u20132002.","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"274_CR7","doi-asserted-by":"crossref","unstructured":"Delvaux J., Verbauwhede I. Attacking PUF-based pattern matching key generators via helper data manipulation. In: Conference on Cryptographer's Track at the RSA, San Francisco, 2014.","DOI":"10.1007\/978-3-319-04852-9_6"},{"key":"274_CR8","unstructured":"National University of Singapore, Department of Electrical and Computer Engineering. Database of Physically Unclonable Functions. [En ligne]. [Acc\u00e8s le 14 11 2018]."},{"issue":"15","key":"274_CR9","first-page":"927","volume":"37","author":"J Miao","year":"2017","unstructured":"Miao J, Li M, Roy S, Ma Y, Yu B. SD-PUF: spliced digital physical unclonable function. IEEE Trans Comput-Aided Design Integr Circuits Syst. 2017;37(15):927\u201340.","journal-title":"IEEE Trans Comput-Aided Design Integr Circuits Syst"},{"key":"274_CR10","doi-asserted-by":"crossref","unstructured":"Jeon D, Choi B.-D. Circuit design of physical unclonable function for security applications in standard CMOS technology. In: IEEE International Conference on Electron Devices and Solid-State Circuits (EDSSC), 2016.","DOI":"10.1109\/EDSSC.2016.7785216"},{"issue":"14","key":"274_CR11","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/TIFS.2017.2774761","volume":"13","author":"W-C Wang","year":"2018","unstructured":"Wang W-C, Yona Y, Diggavi S, Gupta P. Design and analysis of stability-guaranteed PUFs. IEEE Trans Inform Forensics Secur. 2018;13(14):978\u201392.","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"274_CR12","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1038\/nnano.2016.1","volume":"11","author":"Z Hu","year":"2016","unstructured":"Hu Z, Lobez-Comeras J, Park H, Tang J, Afzali A, Tulevski G, Hannon J, Liehr M, Han S-J. Physically unclonable cryptographic primitives using self-assembled carbon nanotubes. Nat Nanotechnol. 2016;11:559\u201365.","journal-title":"Nat Nanotechnol"},{"key":"274_CR13","doi-asserted-by":"crossref","unstructured":"Marconot J, Pebay-Peyroula F, H\u00e9ly D. IoT Components LifeCycle Based Security Analysis. In: Euromicro Conference on Digital System Design (DSD), Vienne, 2017.","DOI":"10.1109\/DSD.2017.44"},{"key":"274_CR14","unstructured":"Marconot J, H\u00e9ly D, Pebay-Peyroula F. SPN-DPUF: substitution-permutation network based secure circuit for digital PUF. In: IEEE Symposium on Very Large Scale Integrated, ISVLSI 2019, 2019."},{"key":"274_CR15","volume-title":"Information technology\u2014securitytechniques\u2014lightweight cryptography\u2014part 1: General","author":"ISO\/IEC 29192-1:2012","year":"2012","unstructured":"ISO\/IEC 29192-1:2012. Information technology\u2014securitytechniques\u2014lightweight cryptography\u2014part 1: General. International organization for standardization, Gen`eve, Switzerland, 2012."},{"key":"274_CR16","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-1-4614-1362-2_11","volume-title":"Embedded systems design with FPGAs","author":"A Maiti","year":"2013","unstructured":"Maiti, A., Gunreddy, V., & Schaumont, P. (2013). A systematic method to evaluate and compare the performance of physical unclonable functions. In Embedded systems design with FPGAs (pp. 245\u2013267). Springer, New York, NY."},{"key":"274_CR17","doi-asserted-by":"crossref","unstructured":"Armknecht F, Moriyama D, Sadeghi AR, Yung M. Towards a unified security model for physically unclonable functions. In: Cryptographers\u2019 Track at the RSA Conference, 2016.","DOI":"10.1007\/978-3-319-29485-8_16"},{"key":"274_CR18","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-319-76804-5","volume-title":"Physically unclonable functions","author":"B Halak","year":"2018","unstructured":"Halak B. Section 5.4: security evaluation metrics for PUF. Physically unclonable functions. Southampton: Springer; 2018. p. 134\u2013142."},{"key":"274_CR19","unstructured":"Danger J-L, Guilley S, Nguyen P, Rioul O. PUFs: standardization and evaluation. In: Mobile Systems Technologies Workshop, 2016, pp 12\u201318"},{"key":"274_CR20","volume-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications","author":"NIST National Institute of Standards and Technology","year":"2010","unstructured":"NIST National Institute of Standards and Technology. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Gaithersburg: NIST; 2010."},{"key":"274_CR21","unstructured":"Van Herrewege A. Section 2.6: quality metrics. In: Lightweight PUF-based key and random number generation. PhD thesis, KU Leuven, Arenberg Doctoral School, Faculty of Engineering Science, 2015, pp. 37\u201346."},{"key":"274_CR22","doi-asserted-by":"crossref","unstructured":"A. F. Webster, S. E. Tavares. On the design of S-BOXES. In: Advances in Cryptology\u2014Crypto '85. Lecture Notes in Computer Science, vol. 218, pp. 523\u2013534, 1985.","DOI":"10.1007\/3-540-39799-X_41"},{"key":"274_CR23","volume-title":"Information technology\u2014securitytechniques\u2014lightweight cryptography\u2014part 2: Block ci-phers","author":"ISO\/IEC 29192-2:2012","year":"2012","unstructured":"ISO\/IEC 29192-2:2012, Information technology\u2014securitytechniques\u2014lightweight cryptography\u2014part 2: Block ci-phers. International organization for standardization, Gen`eve, Switzerland, 2012."},{"key":"274_CR24","doi-asserted-by":"crossref","unstructured":"Hu Z, Han SJ. Creating security primitive by nanoscale manipulation of carbon nanotubes. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 29\u201334, 2017.","DOI":"10.1109\/HST.2017.7951733"},{"key":"274_CR25","unstructured":"May M, Pebay-Peyroula F. Method for securing an integrated circuit during production. US Brevet 2018358310 A1, 13 12 2018."},{"key":"274_CR26","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJ, Seurin Y, Vikkelsoe C. PRESENT: an ultra-lightweight block cipher. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 450\u2013466, 2007."},{"issue":"112","key":"274_CR27","doi-asserted-by":"publisher","first-page":"3281","DOI":"10.1109\/TVLSI.2017.2716386","volume":"25","author":"D-H Bui","year":"2017","unstructured":"Bui D-H, Puschini D, Bacles-Min S, Beign\u00e9 E, Tran X-T. AES datapath optimization strategies for low-power low-energy multisecurity-level internet-of-things applications. IEEE Trans Very Large Scale Integr Syst. 2017;25(112):3281\u201390.","journal-title":"IEEE Trans Very Large Scale Integr Syst"},{"key":"274_CR28","unstructured":"Delvaux J. Chapter 5: A Survey on PUF-Based Entity Authentication. In: Security analysis of PUF-based key generation and entity authentication. PhD thesis, KU Leuven and Shanghai Jiao Tong University, 2017, pp. 133\u2013203."},{"issue":"111","key":"274_CR29","first-page":"186","volume":"8","author":"U R\u00fchrmair","year":"2013","unstructured":"R\u00fchrmair U, S\u00f6lter J, Sehnke F, Xu X, Mahmoud A, Stoyva V, Dror G, Schmidhuber J, Burleson W, Devadas S. PUF modeling attacks on simulated and silicon data. IEEE Trans Inform Forensics Secur. 2013;8(111):186\u20131.","journal-title":"IEEE Trans Inform Forensics Secur"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-00274-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-020-00274-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-00274-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,6]],"date-time":"2022-11-06T14:30:43Z","timestamp":1667745043000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-020-00274-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,11]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["274"],"URL":"https:\/\/doi.org\/10.1007\/s42979-020-00274-0","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"type":"print","value":"2662-995X"},{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2020,8,11]]},"assertion":[{"value":"4 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"259"}}