{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T05:04:36Z","timestamp":1748063076657,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/isqed.2014.6783360","type":"proceedings-article","created":{"date-parts":[[2014,4,16]],"date-time":"2014-04-16T17:24:16Z","timestamp":1397669056000},"page":"461-466","source":"Crossref","is-referenced-by-count":23,"title":["Study of IC aging on ring oscillator physical unclonable functions"],"prefix":"10.1109","author":[{"given":"Dinesh","family":"Ganta","sequence":"first","affiliation":[]},{"given":"Leyla","family":"Nazhandali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","journal-title":"Predictive Technology Model (PTM","key":"19"},{"key":"17","first-page":"1200","article-title":"Extracting secret keys from integrated circuits","volume":"13","author":"lim","year":"2005","journal-title":"IEEE TVLSI"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/FPL.2011.35"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/IPFA.2008.4588195"},{"key":"16","first-page":"9","article-title":"Software techniques to combat drift in puf-based authentication systems","author":"kirkpatrick","year":"2010","journal-title":"SECS"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/1146909.1147115"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1063\/1.1567461"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/IEDM.2003.1269296"},{"year":"2010","author":"weste","journal-title":"CMOS VLSI Design A Circuits and Systems Perspective","key":"12"},{"year":"2012","journal-title":"Synopsys HSPICE Documentation","key":"21"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1002\/cpe.805"},{"key":"20","first-page":"1859","article-title":"Modeling of failure probability and statistical design of sram array for yield enhancement in nanoscaled cmos,' Computer-Aided Design of Integrated Circuits and Systems","volume":"24","author":"mukhopadhyay","year":"2005","journal-title":"IEEE Trans- actions"},{"key":"2","first-page":"388","article-title":"Differential power analysis","volume":"99","author":"kocher","year":"0","journal-title":"Crypto"},{"key":"1","first-page":"104","article-title":"Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems","volume":"96","author":"kocher","year":"0","journal-title":"Crypto"},{"key":"10","first-page":"248","article-title":"Impact of negative bias temperature instability on digital circuit reliability","author":"reddy","year":"2002","journal-title":"Reliability Physics Symposium Proceedings"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/HST.2009.5225054"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/FPL.2009.5272361"},{"key":"5","first-page":"63","article-title":"Fpga intrinsic pufs and their use for ip protection","volume":"7","author":"guajardo","year":"0","journal-title":"CHES"},{"key":"4","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ReConFig.2010.63"},{"key":"8","first-page":"36","article-title":"Temperature-Aware cooperative ring oscillator puf","volume":"9","author":"qu","year":"2009","journal-title":"Host"}],"event":{"name":"2014 15th International Symposium on Quality Electronic Design (ISQED)","start":{"date-parts":[[2014,3,3]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2014,3,5]]}},"container-title":["Fifteenth International Symposium on Quality Electronic Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6779216\/6783285\/06783360.pdf?arnumber=6783360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T07:43:30Z","timestamp":1498117410000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6783360\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/isqed.2014.6783360","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}