{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T20:42:35Z","timestamp":1776199355056,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/dft.2012.6378190","type":"proceedings-article","created":{"date-parts":[[2012,12,18]],"date-time":"2012-12-18T21:51:04Z","timestamp":1355867464000},"page":"1-6","source":"Crossref","is-referenced-by-count":65,"title":["Modeling SRAM start-up behavior for Physical Unclonable Functions"],"prefix":"10.1109","author":[{"given":"Mafalda","family":"Cortez","sequence":"first","affiliation":[]},{"given":"Apurva","family":"Dargar","sequence":"additional","affiliation":[]},{"given":"Said","family":"Hamdioui","sequence":"additional","affiliation":[]},{"given":"Geert-Jan","family":"Schrijen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","volume":"3027","author":"dodis","year":"2004","journal-title":"LNCS"},{"key":"17","article-title":"Buskeeper PUFs, a promising alternative to D Flip-Flop PUFs","author":"vd leest","year":"2012","journal-title":"Host"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030096"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"16","first-page":"99","article-title":"Robust key extraction from physical unclonable functions","volume":"3531","author":"skoric","year":"2005","journal-title":"LNCS"},{"key":"13","first-page":"63","article-title":"FPGA Intrinsic PUFs and Their Use for IP Protection","author":"guajardo","year":"2007","journal-title":"Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"14","first-page":"335","article-title":"An Alternative to Error Correction for SRAM-Like PUFs","author":"hofer","year":"2010","journal-title":"Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"11","article-title":"Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs","author":"maes","year":"0","journal-title":"Workshop on Cryptographic Hardware and Embedded Systems 2009"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2007.4380646"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.1987.1052809"},{"key":"20","first-page":"393","article-title":"New shielding functions to enhance privacy and prevent misuse of biometric templates","author":"linnartz","year":"2003","journal-title":"Proceedings of AVBPA'03 Springer-Verlag"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4020-8363-1","author":"pavlov","year":"2008","journal-title":"CMOS SRAM Circuit Design and Parametric Test in Nano-Scaled Technologies"},{"key":"23","author":"dargar","year":"2011","journal-title":"Modeling SRAM Start-up Characteristics for Physical Unclonable Functions"},{"key":"24","author":"sedra","year":"2004","journal-title":"Microelectronics Circuits"},{"key":"25","author":"dimitrijev","year":"2006","journal-title":"Principles of Semiconductor Devices"},{"key":"26","year":"2011"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TSM.2008.2011182"},{"key":"28","author":"silva","year":"2006","journal-title":"Leakage in Nanometer CMOS Technologies"},{"key":"29","first-page":"55","article-title":"SRAM Leakage Suppression by Minimizing Standby Supply Voltage","author":"qin","year":"2004","journal-title":"Int Symp on Quality Electronic Design"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14452-3","author":"sadeghi","year":"2010","journal-title":"Towards Hardware-Intrinsic Security Foundations and Practice"},{"key":"2","first-page":"251","article-title":"RFID Privacy Models Revisited","author":"ng","year":"2008","journal-title":"Eur Symp Research in Computer Security"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"1","year":"0"},{"key":"7","article-title":"Intrinsic PUFs from Flip-flops on Reconfigurable Devices","author":"maes","year":"0","journal-title":"3rd Benelux Workshop on Information and System Security 2008"},{"key":"6","year":"2011"},{"key":"5","article-title":"Read-proof hardware from protective coatings","author":"tuyls","year":"0","journal-title":"Workshop on Cryptographic Hardware and Embedded Systems - CHES 2006"},{"key":"4","author":"pappu","year":"2001","journal-title":"Physical one-way functions"},{"key":"9","article-title":"FPGA Intrinsic PUFs and Their Use for IP Protection","author":"guajardo","year":"0","journal-title":"Workshop on Cryptographic Hardware and Embedded Systems 2007"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559053"}],"event":{"name":"2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","location":"Austin, TX, USA","start":{"date-parts":[[2012,10,3]]},"end":{"date-parts":[[2012,10,5]]}},"container-title":["2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6362314\/6378188\/06378190.pdf?arnumber=6378190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T04:23:10Z","timestamp":1498018990000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6378190\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/dft.2012.6378190","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}