{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T12:33:30Z","timestamp":1761309210582,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/hst.2013.6581558","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:14:00Z","timestamp":1377724440000},"page":"13-18","source":"Crossref","is-referenced-by-count":44,"title":["Novel strong PUF based on nonlinearity of MOSFET subthreshold operation"],"prefix":"10.1109","author":[{"given":"Mukund","family":"Kalyanaraman","sequence":"first","affiliation":[]},{"given":"Michael","family":"Orshansky","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.1989.572629"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/5.573737"},{"journal-title":"Design for Manufaclurability and Sialislical Design A Conslruclive Approach","year":"2007","author":"orshansky","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICEAC.2010.5702285"},{"journal-title":"Extracting secret keys from integrated circuits","year":"2004","author":"daihyun","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2011.5938005"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2011.72"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866335"},{"key":"12","first-page":"1","author":"majzoobi","year":"2008","journal-title":"IEEE Inl Tesl Conf"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2000.852648"},{"key":"20","first-page":"7","article-title":"New generation of predictive technology model for sub-45nm design exploration","author":"zhao","year":"2006","journal-title":"ISQED"},{"journal-title":"Predictive Technology Model","year":"0","author":"cao","key":"22"},{"journal-title":"International Technology Roadmap for Semiconductors","year":"0","key":"23"},{"key":"24","article-title":"A systematic method to evaluate and compare the performance of physical unclonable functions","author":"maiti","year":"2011","journal-title":"Cryptology ePrint Archive"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2010.24"},{"key":"27","first-page":"27","article-title":"LIBSYM: A library for support vector machines","volume":"2","author":"chang","year":"0","journal-title":"ACM Transaclions on Inlel!igenl Syslems and Technology"},{"key":"28","first-page":"1871","article-title":"LIBLINEAR: A library for large linear classification","volume":"9","author":"fan","year":"2008","journal-title":"Journal of Machine Learning Research"},{"journal-title":"Circuits and Algorithms for Pipelined Adcs in Scaled Cmos Technology","year":"2008","author":"brooks","key":"29"},{"key":"3","first-page":"372","article-title":"IC Identification Circuit using Device mismatch","author":"lofstrom","year":"2000","journal-title":"ISSCC"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8348-9418-2_33"},{"key":"1","first-page":"148","article-title":"Silicon physical random functions","author":"gassend","year":"2002","journal-title":"CCS"},{"journal-title":"Analog Design for CMOS VLSI Syslems","year":"2001","author":"maloberti","key":"30"},{"key":"7","first-page":"63","article-title":"FPGA intrinsic PUFs and their use for IP protection","volume":"4727","author":"guajardo","year":"2007","journal-title":"CHES Workshop Ser LNCS"},{"key":"6","article-title":"Initial SRAM state as a fingerprint and source of true random numbers for RHD tags","author":"holcomb","year":"2007","journal-title":"Proc of the Conf on RFID Security"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.805"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559053"},{"key":"8","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"}],"event":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","start":{"date-parts":[[2013,6,2]]},"location":"Austin, TX, USA","end":{"date-parts":[[2013,6,3]]}},"container-title":["2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6573517\/6581554\/06581558.pdf?arnumber=6581558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T20:53:37Z","timestamp":1498078417000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6581558\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/hst.2013.6581558","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}