{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T12:58:34Z","timestamp":1768913914831,"version":"3.49.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/ahs.2018.8541493","type":"proceedings-article","created":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T00:15:58Z","timestamp":1542932158000},"page":"333-338","source":"Crossref","is-referenced-by-count":7,"title":["New Concept for Physically-Secured E-Coins Circulations"],"prefix":"10.1109","author":[{"given":"Ayoub","family":"Mars","sequence":"first","affiliation":[]},{"given":"Wael","family":"Adi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"632","article-title":"Combined Modeling and Side Channel Attacks on Strong PUFs","volume":"2013","author":"mahmoud","year":"2013","journal-title":"IACR Cryptology ePrint"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581579"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-3-642-21599-5_3","article-title":"Side-Channel Analysis of PUFs and Fuzzy Extractors","author":"merli","year":"2011","journal-title":"Int Conf on Trust and Trustworthy Comput"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"ref35","year":"0","journal-title":"SmartFusion2 SoC FPGA Family"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/BLISS.2008.33"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14452-3_1","article-title":"Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions","author":"maes","year":"2010","journal-title":"Towards Hardware-Intrinsic Security"},{"key":"ref12","article-title":"Clone-resistant structures in Microsemi SoC units","author":"adi","year":"2017","journal-title":"CryptArchi"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2017.8090425"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-China.2017.7991092"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_8"},{"key":"ref16","article-title":"Enhancing RFID Security and Privacy by Physically Unclonable Functions","author":"sadeghi","year":"0","journal-title":"Towards Hardware-Intrinsic Security"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/11496137_28","article-title":"Robust key extraction from physical uncloneable functions","volume":"3531","author":"\u0161koric","year":"2005","journal-title":"Applied Cryptography and Network Security"},{"key":"ref18","author":"lim","year":"2004","journal-title":"Extracting secret keys from integrated circuits"},{"key":"ref19","first-page":"311","article-title":"Offline hardware\/software authentication for reconfigurable platforms","author":"simpson","year":"2006","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2008.4700636"},{"key":"ref4","year":"0","journal-title":"Bitcoin"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.19"},{"key":"ref3","first-page":"9","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref6","first-page":"1","article-title":"Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin","author":"karame","year":"2012","journal-title":"IACR Cryptology ePrint"},{"key":"ref29","first-page":"237","article-title":"Modeling attacks on physical unclonable functions","author":"r\u00fchrmair","year":"2010","journal-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BLISS.2008.33"},{"key":"ref7","article-title":"When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies","author":"goldfeder","year":"2017","journal-title":"arXiv Prepr arXiv1708 04748"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"ref9","author":"pappu","year":"2001","journal-title":"Physical One-Way Functions Massachusetts Ave"},{"key":"ref1","article-title":"Demonstrating that a Public Predicate can be Satisfied Without Revealing Any Information About How","author":"chaum","year":"1986","journal-title":"Theory and Application of Cryptographic Techniques"},{"key":"ref20","article-title":"FPGA intrinsic PUFs and their use for IP protection","author":"guajardo","year":"2007","journal-title":"CHES"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/el.2013.3474"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1109\/DSD.2015.57","article-title":"Towards zero biterror-rate physical unclonable function: Mismatch-based vs. Physicalbased approaches in standard CMOS technology","author":"jeon","year":"2015","journal-title":"Proc - 18th Euromicro Conf Digit Syst Des DSD 2015"},{"key":"ref24","first-page":"181","article-title":"Efficient Helper Data Key Extractor on FPGAs","volume":"5154","author":"b\u00f6sch","year":"2008","journal-title":"Proc Cryptographic Hardw Embedded Syst"},{"key":"ref23","first-page":"523","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","author":"dodis","year":"2004","journal-title":"International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-1-4419-8080-9_4","article-title":"Security based on physical unclonability and disorder","author":"r\u00fchrmair","year":"2012","journal-title":"Introduction to Hardware Security and Trust"},{"key":"ref25","year":"0","journal-title":"QUIDDIKEY - Intrinsic ID | IoT Security"}],"event":{"name":"2018 NASA\/ESA Conference on Adaptive Hardware and Systems (AHS)","location":"Edinburgh","start":{"date-parts":[[2018,8,6]]},"end":{"date-parts":[[2018,8,9]]}},"container-title":["2018 NASA\/ESA Conference on Adaptive Hardware and Systems (AHS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8515683\/8541365\/08541493.pdf?arnumber=8541493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T13:40:05Z","timestamp":1643290805000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8541493\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ahs.2018.8541493","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}