{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:46:11Z","timestamp":1730195171580,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/ahs.2018.8541484","type":"proceedings-article","created":{"date-parts":[[2018,11,22]],"date-time":"2018-11-22T19:15:58Z","timestamp":1542914158000},"page":"317-322","source":"Crossref","is-referenced-by-count":6,"title":["Security and Complexity Bounds of SUC-Based Physical Identity"],"prefix":"10.1109","author":[{"given":"Saleh","family":"Mulhem","sequence":"first","affiliation":[]},{"given":"Randa","family":"Zarrouk","sequence":"additional","affiliation":[]},{"given":"Wael","family":"Adi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"1995","author":"bellare","journal-title":"Random Oracles are Practical A Paradigm for Designing E cient Protocols","key":"ref10"},{"key":"ref11","first-page":"68","article-title":"On privacy models for RFID","author":"vaudenay","year":"2007","journal-title":"In Proceedings of ASIACRYPT volume 4833 of LNCS"},{"key":"ref12","article-title":"Physical unclonable functions in theory and practice","author":"b\u00f6hm","year":"2012","journal-title":"Springer Science & Business Media"},{"key":"ref13","first-page":"599","volume":"46","author":"koblitz","year":"2004","journal-title":"A survey of public-key cryptosystems SIAM review"},{"key":"ref14","first-page":"1","article-title":"Reliable secret key generation from physical unclonable functions under varying environmental conditions","author":"g\u00fcnl\u00fc","year":"2015","journal-title":"In Information Forensics and Security (WIFS) 2015 IEEE International Workshop on"},{"key":"ref15","first-page":"517","article-title":"Secure key generation from biased PUFs","author":"maes","year":"2015","journal-title":"Proc Of Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref16","first-page":"106","article-title":"Attacking PUFbased pattern matching key generators via helper data manipulation","author":"delvaux","year":"2014","journal-title":"Proc The Cryptographer s Track at RSA Conf"},{"key":"ref17","first-page":"70","article-title":"An efficient reliable PUFbased cryptographic key generator in 65nm CMOS","author":"bhargava","year":"2014","journal-title":"Proc Design Automation and Test in Europe"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2517300.2517304"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TCAD.2014.2370531"},{"key":"ref4","first-page":"148","article-title":"Clone-Resistant DNA-Like Secured Dynamic Identity,Bioinspired Learning and Intelligent Systems for Security","author":"adi","year":"2008","journal-title":"2008 BLISS&#x2019;08 ECSIS Symposium on IEEE"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/FPL.2007.4380646"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICCE-China.2017.7991031"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/AHS.2013.6604236"},{"key":"ref8","article-title":"PUF-Enhanced RFID Security and Privacy","author":"sadeghi","year":"2010","journal-title":"In 2nd Work&#x00AC;shop on Se&#x00AC;cu&#x00AC;re Com&#x00AC;po&#x00AC;nent and Sys&#x00AC;tem Iden&#x00AC;ti&#x00AC;fi&#x00AC;ca&#x00AC;ti&#x00AC;on (SECSI 2010)"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/2818186"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ICCAD.2015.7372589"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"year":"2012","author":"maes","article-title":"Physically Unclonable Functions: Constructions","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1098\/rsta.2006.1895"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1017\/CBO9780511546891"},{"key":"ref21","first-page":"277","article-title":"On the Foundations of Physical Unclonable Functions","author":"r\u00fchrmair","year":"2009","journal-title":"IACR Cryptology EPrint Archive 2009"},{"key":"ref23","first-page":"73","article-title":"Physical and Mechatronic Security, Technologies and Future Trends for Vehicular Environment","author":"adi","year":"2017","journal-title":"VDI-Fachtagung Automotive Security VDI-Berichte 2310"}],"event":{"name":"2018 NASA\/ESA Conference on Adaptive Hardware and Systems (AHS)","start":{"date-parts":[[2018,8,6]]},"location":"Edinburgh","end":{"date-parts":[[2018,8,9]]}},"container-title":["2018 NASA\/ESA Conference on Adaptive Hardware and Systems (AHS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8515683\/8541365\/08541484.pdf?arnumber=8541484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T21:52:48Z","timestamp":1643233968000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8541484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ahs.2018.8541484","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}