{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T16:09:13Z","timestamp":1778947753052,"version":"3.51.4"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/hst.2014.6855566","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T20:26:31Z","timestamp":1406665591000},"page":"44-49","source":"Crossref","is-referenced-by-count":47,"title":["Entropy loss in PUF-based key generation schemes: The repetition code pitfall"],"prefix":"10.1109","author":[{"given":"Patrick","family":"Koeberl","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiangtao","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anand","family":"Rajan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","author":"pappu","year":"2001","journal-title":"Physical one-way functions"},{"key":"22","author":"berg den r van","year":"2012","journal-title":"Entropy Analysis of Physical Unclonable Functions"},{"key":"17","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1007\/978-3-642-04138-9_24","article-title":"Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs","author":"maes","year":"2009","journal-title":"Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems CHES 2009"},{"key":"23","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/978-3-642-33027-8_16","article-title":"Soft decision error correction for compact memory-based PUFs using a single enrollment","volume":"7428","author":"leest der v van","year":"2012","journal-title":"Cryptographic Hardware and Embedded Systems CHES 2012"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.25"},{"key":"15","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/978-3-642-33027-8_18","article-title":"PUFKY: A fully functional PUF-based cryptographic key generator","author":"maes","year":"2012","journal-title":"Cryptographic Hardware and Embedded Systems CHES 2012"},{"key":"16","first-page":"17","article-title":"Intrinsic PUFs from flip-flops on reconfigurable devices","author":"maes","year":"2008","journal-title":"3rd Benelux Workshop on Information and System Security 2008"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_15"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559053"},{"key":"21","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/11894063_25","article-title":"Offline hardware\/software authentication for reconfigurable platforms","volume":"4249","author":"simpson","year":"2006","journal-title":"Workshop on Cryptographic Hardware and Embedded Systems - CHES 2006"},{"key":"3","first-page":"181","article-title":"Efficient helper data key extractor on FPGAs","volume":"5154","author":"bosch","year":"2008","journal-title":"CHES'08 Proceedings of 10th International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"20","first-page":"7","author":"simons","year":"2012","journal-title":"2012 IEEE International Symposium On"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_1"},{"key":"1","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/978-3-642-10366-7_40","article-title":"Memory leakage-resilient encryption based on physically unclonable functions","author":"armknecht","year":"2009","journal-title":"Advances in Cryptology-ASIACRYPT 2009"},{"key":"10","first-page":"271","article-title":"Evaluation of a PUF device authentication scheme on a discrete 0.13um SRAM","volume":"7222","author":"koeberl","year":"2011","journal-title":"Proceedings of 3rd International Conference on Trusted Systems (INTRUST"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"6","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","volume":"3027","author":"dodis","year":"2004","journal-title":"Advances in Cryptology-EUROCRYPT 2004"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030096"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"8","first-page":"63","article-title":"FPGA intrinsic PUFs and their use for IP protection","volume":"4727","author":"guajardo","year":"2007","journal-title":"Cryptographic Hardware and Embedded Systems Workshop"}],"event":{"name":"2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","location":"Arlington, VA, USA","start":{"date-parts":[[2014,5,6]]},"end":{"date-parts":[[2014,5,7]]}},"container-title":["2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6847848\/6855557\/06855566.pdf?arnumber=6855566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:31:49Z","timestamp":1498152709000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6855566\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/hst.2014.6855566","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}