{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:21:38Z","timestamp":1761294098857,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/icassp40776.2020.9053107","type":"proceedings-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T20:21:13Z","timestamp":1586463673000},"page":"2807-2811","source":"Crossref","is-referenced-by-count":7,"title":["Low-Complexity and Reliable Transforms for Physical Unclonable Functions"],"prefix":"10.1109","author":[{"given":"Onur","family":"Gunlu","sequence":"first","affiliation":[]},{"given":"Rafael F.","family":"Schaefer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412622"},{"key":"ref11","first-page":"1","article-title":"Reliable secret key generation from physical unclonable functions under varying environmental conditions","author":"g\u00fcnl\u00fc","year":"2015","journal-title":"IEEE Int Workshop Inf Forensics Security"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.3390\/e20050340","article-title":"Secure and reliable key agreement with physical unclonable functions","volume":"20","author":"g\u00fcnl\u00fc","year":"2018","journal-title":"Entropy"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2001.941320"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2471179"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1952.tb01393.x"},{"key":"ref19","first-page":"739","article-title":"Estimate of the number of signals in error correcting codes","volume":"117","author":"varshamov","year":"1957","journal-title":"Dok Akad Nauk SSSR"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033228"},{"key":"ref3","article-title":"Physical One-way Functions","author":"pappu","year":"2001","journal-title":"Ph D thesis"},{"key":"ref6","article-title":"Key Agreement with Physical Unclonable Functions and Biometric Identifiers","author":"g\u00fcnl\u00fc","year":"2018","journal-title":"Ph D thesis"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2098872"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2046984"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref2","article-title":"Physical random functions","author":"gassend","year":"2003","journal-title":"M S thesis"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2848","DOI":"10.1109\/TIFS.2019.2911155","article-title":"Code constructions for physical unclonable functions and biometric secrecy systems","volume":"14","author":"g\u00fcnl\u00fc","year":"2019","journal-title":"IEEE Trans Inf Forensics Security"},{"journal-title":"Physical Unclonable Functions in Theory and Practice","year":"2012","author":"b\u00f6hm","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513108"},{"key":"ref22","article-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications","author":"rukhin","year":"2001","journal-title":"Tech Rep Natl Inst Stand Technol"},{"key":"ref21","first-page":"8198","article-title":"DCT based ring oscillator physical unclonable functions","author":"g\u00fcnl\u00fc","year":"2014","journal-title":"IEEE Int Conf Acoust Speech Signal Process"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1055107"},{"key":"ref23","article-title":"On computing the distribution function for the sum of independent and nonidentical random indicators","author":"hong","year":"2011","journal-title":"Tech Rep Dep Stat Virginia Tech"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2043769"}],"event":{"name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2020,5,4]]},"location":"Barcelona, Spain","end":{"date-parts":[[2020,5,8]]}},"container-title":["ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040208\/9052899\/09053107.pdf?arnumber=9053107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:19:11Z","timestamp":1656375551000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9053107\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icassp40776.2020.9053107","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}