{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:03:25Z","timestamp":1725793405380},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/hst.2013.6581562","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:14:00Z","timestamp":1377724440000},"page":"35-40","source":"Crossref","is-referenced-by-count":22,"title":["Adapting voltage ramp-up time for temperature noise reduction on memory-based PUFs"],"prefix":"10.1109","author":[{"given":"Mafalda","family":"Cortez","sequence":"first","affiliation":[]},{"given":"Said","family":"Hamdioui","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"van der Leest","sequence":"additional","affiliation":[]},{"given":"Roel","family":"Maes","sequence":"additional","affiliation":[]},{"given":"Geert-Jan","family":"Schrijen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"47","article-title":"Comparison of SRAM and FF PUF in 65nm technology","author":"claes","year":"2011","journal-title":"NordSec"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2012.6378190"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513106"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955012"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225054"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228379"},{"key":"11","first-page":"268","article-title":"Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment","author":"leest der v van","year":"2012","journal-title":"CHES"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_23"},{"key":"21","article-title":"Intrinsic PUFs from flip-flops on reconfigurable devices","author":"maes","year":"2008","journal-title":"WISSec"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559053"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224311"},{"key":"23","first-page":"406","article-title":"A 1. 6pJ\/bit 96% Stable Chip-ID Generating Circuit using Process Variations","author":"su","year":"2007","journal-title":"ISSCC"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ESSCIRC.2007.4430253"},{"year":"2012","key":"25"},{"key":"3","first-page":"283","article-title":"PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon","author":"katzenbeisser","year":"2012","journal-title":"CHES"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"10","first-page":"302","article-title":"PUFKY: A fully functional puf-based cryptographic key generator","author":"maes","year":"2012","journal-title":"CHES"},{"key":"1","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1145\/586110.586132","article-title":"Silicon physical random functions","author":"gassend","year":"2002","journal-title":"ACM CCS"},{"key":"7","first-page":"99","article-title":"Robust key extraction from Physical Unclonable Functions","author":"skoric","year":"2005","journal-title":"ACNS"},{"key":"6","first-page":"63","article-title":"FPGA intrinsic PUFs and their use for IP protection","author":"guajardo","year":"2007","journal-title":"CHES"},{"key":"5","first-page":"298","article-title":"Quantitative and statistical performance evaluation of arbiter physical unclonable functions on fpgas","author":"yoshida","year":"2010","journal-title":"ReConFig"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513108"},{"key":"9","first-page":"393","article-title":"New shielding functions to enhance privacy and prevent misuse of biometric templates","author":"linnartz","year":"2003","journal-title":"AVBPA"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"}],"event":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","start":{"date-parts":[[2013,6,2]]},"location":"Austin, TX, USA","end":{"date-parts":[[2013,6,3]]}},"container-title":["2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6573517\/6581554\/06581562.pdf?arnumber=6581562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T11:26:10Z","timestamp":1715945170000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6581562\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/hst.2013.6581562","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}