{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:18:23Z","timestamp":1730222303868,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1109\/fpl.2009.5272414","type":"proceedings-article","created":{"date-parts":[[2009,9,30]],"date-time":"2009-09-30T14:42:09Z","timestamp":1254321729000},"page":"560-563","source":"Crossref","is-referenced-by-count":4,"title":["Secure FPGA technologies and techniques"],"prefix":"10.1109","author":[{"given":"An","family":"Braeken","sequence":"first","affiliation":[]},{"given":"Serge","family":"Kubera","sequence":"additional","affiliation":[]},{"given":"Frederik","family":"Trouillez","sequence":"additional","affiliation":[]},{"given":"Abdellah","family":"Touhafi","sequence":"additional","affiliation":[]},{"given":"Nele","family":"Mentens","sequence":"additional","affiliation":[]},{"given":"Jo","family":"Vliegen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"security solutions using spartan-3 generation fpgas","volume":"wp226","author":"smerdon","year":"2008"},{"key":"2","article-title":"fpga iff copy protection using dallas semiconductor\/maxim ds2432 secure eeproms","volume":"xapp780","author":"baetoniu","year":"2005"},{"key":"10","article-title":"physical unclonable functions and applications","author":"devadas","year":"2007","journal-title":"MIT security lecture PUFs"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.51"},{"key":"7","article-title":"electrical biassing and voltage contrast imaging in a focused ion beam system","author":"campbell","year":"1995","journal-title":"Proceedings of the International Symposium for Testing and Failure Analysis"},{"key":"6","article-title":"life cycle of an fpga intrinsic puf: from start-up to butterfly","author":"guajardo","year":"2008","journal-title":"Philips and K U L presentation"},{"year":"0","key":"5"},{"key":"4","article-title":"semi-invasive attacks - a new approach to hardware security analysis","author":"skorobogatov","year":"2005","journal-title":"Technical report Cambridge University"},{"key":"9","first-page":"9","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"Proceedings ACM\/IEEE Design Automation Conference (DAC)"},{"key":"8","article-title":"fips pub","volume":"197","year":"2001","journal-title":"Specification for the AES"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2005.64"}],"event":{"name":"2009 International Conference on Field Programmable Logic and Applications (FPL)","start":{"date-parts":[[2009,8,31]]},"location":"Prague, Czech Republic","end":{"date-parts":[[2009,9,2]]}},"container-title":["2009 International Conference on Field Programmable Logic and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5247666\/5272229\/05272414.pdf?arnumber=5272414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T19:43:46Z","timestamp":1489866226000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5272414\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/fpl.2009.5272414","relation":{},"subject":[],"published":{"date-parts":[[2009,8]]}}}