{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T18:05:47Z","timestamp":1770833147853,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/dft.2013.6653606","type":"proceedings-article","created":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T19:58:04Z","timestamp":1384199884000},"page":"196-203","source":"Crossref","is-referenced-by-count":86,"title":["Secure Split-Test for preventing IC piracy by untrusted foundry and assembly"],"prefix":"10.1109","author":[{"given":"Gustavo K.","family":"Contreras","sequence":"first","affiliation":[]},{"given":"Md. Tauhidur","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Tehranipoor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118491859060"},{"key":"17","year":"0"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2010.12"},{"key":"18","year":"2012","journal-title":"MATLAB Version 7 14 0"},{"key":"15","first-page":"1300","article-title":"A novel ASIC implementation of RSA algorithm","author":"keija","year":"2003","journal-title":"Proc 5th International Conference on ASIC (ICASIC '03)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.24"},{"key":"13","first-page":"201","article-title":"Active hardware metering for intellectual property protection and security","author":"alkabani","year":"2007","journal-title":"Proc 16th USENIX Security Symposium"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2008.4484823"},{"key":"11","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","article-title":"FPGA intrinsic PUFs and their use for IP protection","author":"guajardo","year":"2007","journal-title":"9th Intl Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007)"},{"key":"12","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/3-540-45496-9_7","article-title":"Intellectual property metering","author":"koushanfar","year":"2001","journal-title":"Proc 4th Int Workshop Information Hiding (IHW'01)"},{"key":"3","year":"2002","journal-title":"PCKS #1 V2 1 Rsa Cryptography Standard"},{"key":"21","author":"bushnell","year":"2000","journal-title":"Essentials of Electronic Testing for Digital Memory and Mixed-Signal VLSI Circuits"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(76)80043-8"},{"key":"2","article-title":"The intel random number generator","author":"jun","year":"1999","journal-title":"Intel Corporation"},{"key":"10","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"1","year":"2010","journal-title":"Defense Industrial Base Assessment Counterfeit Electronics"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TCAPT.2007.906050"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TCAPT.2006.882451"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TCAPT.2007.893682"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.250627"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"8","first-page":"372","article-title":"IC identification using device mismatch","author":"lofstrom","year":"2000","journal-title":"IEEE Int Solid-State Circuit Conf (ISSCC)"}],"event":{"name":"2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","location":"New York City, NY, USA","start":{"date-parts":[[2013,10,2]]},"end":{"date-parts":[[2013,10,4]]}},"container-title":["2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6644330\/6653572\/06653606.pdf?arnumber=6653606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T10:49:05Z","timestamp":1688640545000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6653606\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/dft.2013.6653606","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}