{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T10:09:38Z","timestamp":1750154978766,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icacci.2016.7732227","type":"proceedings-article","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T15:57:45Z","timestamp":1478620665000},"page":"1305-1308","source":"Crossref","is-referenced-by-count":4,"title":["Challenge-response generation using RO-PUF with reduced hardware"],"prefix":"10.1109","author":[{"given":"Abhishek","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Ravi Shankar","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"K R","family":"Kashwan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"3194","article-title":"Physically Unclonable Function with Tristate Buffers","author":"ozturk","year":"2008","journal-title":"IEEE International Symposium on Circuits and Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9088-4"},{"key":"ref10","first-page":"33","article-title":"Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching","author":"majzoobi","year":"2004","journal-title":"Proc IEEE Secur Privacy Workshops (SPW)"},{"key":"ref6","first-page":"1","article-title":"Processor Based Strong Physically Unclonable Function with Aging-Based Response Tuning","volume":"x","author":"kong","year":"2013","journal-title":"IEEE Transaction on Emerging Topics in Computing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2015.7148572"},{"key":"ref5","first-page":"664","article-title":"Using physical unclonable functions for hardware authentication: a survey","volume":"29","author":"eiroa","year":"2014","journal-title":"Journal of Computer Science and Technology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2008.4700636"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2427259"},{"journal-title":"Lightweight PUF-Based key and Random Number Generation","year":"2015","author":"van herrewege","key":"ref7"},{"key":"ref2","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"edward suh","year":"2007","journal-title":"44th ACM\/IEEE Design Automation Conference"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2165540"}],"event":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2016,9,21]]},"location":"Jaipur, India","end":{"date-parts":[[2016,9,24]]}},"container-title":["2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7592392\/7732013\/07732227.pdf?arnumber=7732227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T07:05:45Z","timestamp":1480489545000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7732227\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icacci.2016.7732227","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}