{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:01:54Z","timestamp":1729641714702,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/ahs.2012.6268655","type":"proceedings-article","created":{"date-parts":[[2012,8,22]],"date-time":"2012-08-22T10:49:08Z","timestamp":1345632548000},"page":"227-232","source":"Crossref","is-referenced-by-count":3,"title":["Cocoon-PUF, a novel mechatronic secure element technology"],"prefix":"10.1109","author":[{"given":"Heinz","family":"Kreft","sequence":"first","affiliation":[]},{"given":"Wael","family":"Adi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/RFID.2011.5764623"},{"key":"35","first-page":"393","article-title":"New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates","author":"linnartz","year":"0","journal-title":"Audio-and Video-based Biometrie Person Authentication - AVBPA 2003"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/TMTT.2010.2095030"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/MWSYM.2010.5517608"},{"doi-asserted-by":"publisher","key":"33","DOI":"10.1145\/1284680.1284683"},{"key":"15","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/11894063_29","article-title":"Read-Proof Hardware from Protective Coatings","volume":"4249","author":"tuyls","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"34","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","author":"dodis","year":"2004","journal-title":"Advances in Cryptology EUROCRYPT 2004"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1007\/s10796-008-9142-z"},{"year":"2001","author":"pappu","journal-title":"Physical one-way functions","key":"13"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/RFID.2008.4519377"},{"year":"1983","author":"bauder","journal-title":"An Anti-counterfeiting Concept for Currency Systems","key":"11"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1080\/0161-118491858737"},{"key":"21","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","article-title":"FPGA intrinsic PUFs and their use for IP protection","volume":"4727","author":"guajardo","year":"2007","journal-title":"CHES Ser Lecture Notes in Computer Science"},{"year":"1999","author":"indeck","journal-title":"Method and Apparatus for Fingerprinting and Authenticating Various Magnetic Media","key":"20"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1109\/TC.2008.212"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1109\/HST.2008.4559053"},{"key":"24","first-page":"14","article-title":"Intrinsic pufs from flip-flops on reconfigurable devices","author":"maes","year":"0","journal-title":"3rd Benelux Workshop on Information and System Security (WISSec 2008) Eindhoven NL 2008"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1109\/ISSCC.2007.373466"},{"key":"26","first-page":"53","article-title":"Hardware intrinsic security from D flip-flops","author":"leest","year":"0","journal-title":"Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing Chicago Illinois USA 2010"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1109\/TVLSI.2005.859470"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1145\/586110.586132"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1145\/1873548.1873557"},{"year":"2012","author":"kreft","journal-title":"Tamper-Protected Hardware and Methods for Using Same","key":"3"},{"year":"2011","author":"kreft","journal-title":"Off-line Transfer of Electronic Tokens between Peer-Devices","key":"2"},{"year":"2009","author":"skorobogatov","journal-title":"Hardware Security Trends and Pitfalls of the Past Decade","key":"10"},{"year":"2010","author":"kreft","journal-title":"FairCASH Based on Loss Resistant Teleportation","key":"1"},{"key":"30","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1007\/978-3-642-15031-9_25","article-title":"The glitch PUF: A new delay-PUF architecture exploiting glitch shapes","volume":"6225","author":"suzuki","year":"2010","journal-title":"Lecture Notes in Computer Science"},{"year":"2005","author":"skorobogatov","journal-title":"Semi-invasive Attacks - A New Approach to Hardware Security Analysis","key":"7"},{"key":"6","first-page":"1","article-title":"Tamper resistance: A cautionary note","volume":"2","author":"anderson","year":"1996","journal-title":"Second USENIX Workshop on Electronic Commerce"},{"key":"32","first-page":"3","article-title":"Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions","author":"verbauwhede","year":"2010","journal-title":"Towards Hardware-Intrinsic Security Ser Information Security and Cryptography"},{"year":"2011","author":"schobert","journal-title":"Softwaregestu?tztes Reverse-Engineering Von Logik-Gattern in Integrierten Schaltkreisen","key":"5"},{"doi-asserted-by":"publisher","key":"31","DOI":"10.1145\/1973009.1973111"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/DATE.2008.4484823"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/FDTC.2009.39"},{"year":"2008","author":"skorobogatov","journal-title":"Tamper Resistance and Hardware Security","key":"8"}],"event":{"name":"2012 NASA\/ESA Conference on Adaptive Hardware and Systems (AHS)","start":{"date-parts":[[2012,6,25]]},"location":"Erlangen, Germany","end":{"date-parts":[[2012,6,28]]}},"container-title":["2012 NASA\/ESA Conference on Adaptive Hardware and Systems (AHS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6264152\/6268630\/06268655.pdf?arnumber=6268655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T19:09:14Z","timestamp":1497985754000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6268655\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/ahs.2012.6268655","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}