{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:42:50Z","timestamp":1774366970713,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/hst.2008.4559053","type":"proceedings-article","created":{"date-parts":[[2008,7,9]],"date-time":"2008-07-09T16:06:01Z","timestamp":1215619561000},"page":"67-70","source":"Crossref","is-referenced-by-count":444,"title":["Extended abstract: The butterfly PUF protecting IP on every FPGA"],"prefix":"10.1109","author":[{"given":"Sandeep S.","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Guajardo","sequence":"additional","affiliation":[]},{"given":"Roel","family":"Maes","sequence":"additional","affiliation":[]},{"given":"Geert-Jan","family":"Schrijen","sequence":"additional","affiliation":[]},{"given":"Pim","family":"Tuyls","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2007.373466"},{"key":"17","article-title":"embedded trusted computing without non-volatile memory","author":"schellekens","year":"2008","journal-title":"LNCS"},{"key":"22","year":"2008","journal-title":"Security Solutions Using Spartan-3 Generation FPGAs"},{"key":"18","first-page":"311","article-title":"offline hardware\/software authentication for reconfigurable platforms","volume":"4249","author":"simpson","year":"2006","journal-title":"LNCS"},{"key":"15","author":"pappu","year":"2001","journal-title":"Physical one-way functions"},{"key":"16","year":"0"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"14","first-page":"393","article-title":"new shielding functions to enhance privacy and prevent misuse of biometrie templates","volume":"2688","author":"linnartz","year":"2003","journal-title":"LNCS"},{"key":"11","year":"0"},{"key":"12","author":"krueger","year":"0","journal-title":"Using High Security Features in Virtex-II Series FPGAs Xapp766 (v1 0) Xilinx"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_29"},{"key":"3","first-page":"523","article-title":"fuzzy extractors: how to generate strong keys from biometrics and other noisy data","volume":"3027","author":"dodis","year":"2004","journal-title":"LNCS"},{"key":"20","first-page":"9","article-title":"physical unclonable functions for device authentication and secret key generation","author":"edward suh","year":"2007","journal-title":"Proceedings of the 44th Design Automation Conference"},{"key":"2","article-title":"efficient helper data key extractor on fpgas","author":"bosch","year":"2008","journal-title":"LNCS"},{"key":"1","year":"0","journal-title":"Application Note 341 v2 0 Using the Design Security Feature in Stratix II and Stratix II GX Devices"},{"key":"10","article-title":"key distribution for wireless sensor networks and physical unclonable functions","author":"guajardo","year":"2008","journal-title":"Printed handout of Secure Component and System Identification -SECSI 2008"},{"key":"7","first-page":"63","article-title":"fpga intrinsic pufs and their use for ip protection","volume":"4727","author":"guajardo","year":"2007","journal-title":"LNCS"},{"key":"6","first-page":"148","article-title":"silicon physical unknown functions","author":"gassend","year":"2002","journal-title":"ACM Conference on Computer and Communications Security - CCS"},{"key":"5","first-page":"149","article-title":"controlled physical random functions","author":"gassend","year":"2002","journal-title":"ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference"},{"key":"4","author":"drimer","year":"2007","journal-title":"Volatile FPGA design security - a survey"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2008.4542135"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2007.4380646"}],"event":{"name":"2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)","location":"Anaheim, CA, USA","start":{"date-parts":[[2008,6,9]]},"end":{"date-parts":[[2008,6,9]]}},"container-title":["2008 IEEE International Workshop on Hardware-Oriented Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4556640\/4559030\/04559053.pdf?arnumber=4559053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T10:29:10Z","timestamp":1489660150000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4559053\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/hst.2008.4559053","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}