{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T05:10:02Z","timestamp":1751951402983,"version":"3.41.2"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1109\/host64725.2025.11050043","type":"proceedings-article","created":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T17:47:34Z","timestamp":1751910454000},"page":"289-299","source":"Crossref","is-referenced-by-count":0,"title":["Quantization Schemes for PUFs: The Entropy-Area Trade-Off"],"prefix":"10.1109","author":[{"given":"Jens","family":"N\u00f6pel","sequence":"first","affiliation":[{"name":"Technical University of Munich, TUM School of Computation, Information and Technology,Munich,Germany"}]},{"given":"Tim","family":"Music","sequence":"additional","affiliation":[{"name":"Technical University of Munich, TUM School of Computation, Information and Technology,Munich,Germany"}]},{"given":"Niklas","family":"Stein","sequence":"additional","affiliation":[{"name":"Technical University of Munich, TUM School of Computation, Information and Technology,Munich,Germany"}]},{"given":"Christoph","family":"Frisch","sequence":"additional","affiliation":[{"name":"Technical University of Munich, TUM School of Computation, Information and Technology,Munich,Germany"}]},{"given":"Michael","family":"Pehl","sequence":"additional","affiliation":[{"name":"Technical University of Munich, TUM School of Computation, Information and Technology,Munich,Germany"}]}],"member":"263","reference":[{"key":"ref1","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","volume-title":"in ACM\/IEEE Design Automation Conference (DAC)","author":"Suh","year":"2007"},{"key":"ref2","article-title":"Initial SRAM state as a fingerprint and source of true random numbers for RFID tags","volume-title":"in Proceedings of the Conference on RFID Security","author":"Holcomb","year":"2007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"volume-title":"Physical Random Functions","year":"2003","author":"Gassend","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2287182"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2007.4401912"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IWASI.2019.8791249"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_18"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-016-0353-z"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.30-65"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774554"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DCIS62603.2024.10769190"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/18.52473"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2012.22"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68773-1_14"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3208325"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS57882.2023.10139352"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-020-00223-w"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89915-8_13"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57543-3_9"}],"event":{"name":"2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2025,5,5]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2025,5,8]]}},"container-title":["2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11050019\/11050011\/11050043.pdf?arnumber=11050043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T04:45:54Z","timestamp":1751949954000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11050043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/host64725.2025.11050043","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]}}}