{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:04:21Z","timestamp":1761581061698,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1109\/date.2010.5456967","type":"proceedings-article","created":{"date-parts":[[2013,2,19]],"date-time":"2013-02-19T13:16:33Z","timestamp":1361279793000},"page":"1065-1070","source":"Crossref","is-referenced-by-count":14,"title":["Novel Physical Unclonable Function with process and environmental variations"],"prefix":"10.1109","author":[{"family":"Xiaoxiao Wang","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Tehranipoor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"369","article-title":"Read-Proof Hardware from Protective Coatings","author":"tuyls","year":"2006","journal-title":"Proc CHES'06"},{"key":"ref11","first-page":"63","article-title":"FPGA intrinsic PUFs and their use for IP protection","author":"guajardo","year":"2007","journal-title":"Proceedings of CHES'07"},{"key":"ref12","article-title":"Initial SRAM state as a fingerprint and source of true random numbers for RFID tags","author":"holcomb","year":"2007","journal-title":"Proc Conf RFID Security"},{"key":"ref13","first-page":"15","article-title":"A Digital 1.6 Pl\/bit Chip Identification Circuit Using Process Variations","author":"su","year":"2007","journal-title":"Proc ISSCC'07"},{"key":"ref14","article-title":"The butterfly PUF: Protecting IP one every PFGA","author":"kumar","year":"2008","journal-title":"Proc IEEE Int Workshop Hardware-Oriented Security Trust"},{"article-title":"Concur-rency and Computation: Practice and Experience, volume 16, chapter Identification and authentication of integrated circuits","year":"2004","author":"gassend","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2008.4519377"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225054"},{"key":"ref18","first-page":"199?02","article-title":"Digital Integrated Circuits","author":"rabaey","year":"2002"},{"year":"2009","key":"ref19","article-title":"Synopsys 90nm Generic Library for Teaching IC Design"},{"key":"ref4","first-page":"388.397","article-title":"Differential Power Analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Lecture Notes in Computer Science"},{"key":"ref3","first-page":"9?4","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"Proc DAC'07"},{"key":"ref6","first-page":"104.113","article-title":"Timing Attacks on Implementations of Diffe-Hellman, RSA, DSS, and Other Systems","volume":"1109","author":"kocher","year":"1996","journal-title":"Lecture Notes in Computer Science"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.25"},{"key":"ref8","first-page":"291","article-title":"Active hardware metering for intellectual property protection and security","author":"alkabani","year":"2007","journal-title":"Proc Usenix Security"},{"key":"ref7","first-page":"1","article-title":"Tamper resistance - a cautionary note","author":"anderson","year":"1996","journal-title":"Proc USENIX Electronic Commerce"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2008.4542137"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225058"},{"article-title":"Physical one-way functions","year":"2001","author":"pappu","key":"ref1"},{"year":"2008","key":"ref20","article-title":"User Manuals for SYNOPSYS Toolset Version 2008.03"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.26"},{"journal-title":"ITRS","article-title":"ITRS Reports and Ordering Information 2007 Edition","year":"2007","key":"ref21"},{"key":"ref24","first-page":"168","article-title":"Estimation of Switching Noise on Power Supply Lines in Deep Sub-micro CMOS circuits","author":"zhao","year":"2000","journal-title":"Proceedings of the Thirteenth International Conference on VLSI Design"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225055"},{"year":"1989","key":"ref26","article-title":"ISCAS?9 Benchmarks"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2000.893641"}],"event":{"name":"2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010)","start":{"date-parts":[[2010,3,8]]},"location":"Dresden","end":{"date-parts":[[2010,3,12]]}},"container-title":["2010 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE 2010)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5450668\/5456897\/05456967.pdf?arnumber=5456967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T15:18:47Z","timestamp":1489850327000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5456967\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/date.2010.5456967","relation":{},"subject":[],"published":{"date-parts":[[2010,3]]}}}