{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T05:22:33Z","timestamp":1773897753156,"version":"3.50.1"},"reference-count":18,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2011,6,1]],"date-time":"2011-06-01T00:00:00Z","timestamp":1306886400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Solid-State Circuits"],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/jssc.2011.2120650","type":"journal-article","created":{"date-parts":[[2011,5,3]],"date-time":"2011-05-03T14:06:48Z","timestamp":1304431608000},"page":"1456-1463","source":"Crossref","is-referenced-by-count":61,"title":["CMOS Silicon Physical Unclonable Functions Based on Intrinsic Process Variability"],"prefix":"10.1109","volume":"46","author":[{"given":"Stefano","family":"Stanzione","sequence":"first","affiliation":[]},{"given":"Daniele","family":"Puntin","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Iannaccone","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"141","article-title":"Information-theoretic security analysis of physical uncloneable functions","author":"tuyls","year":"0","journal-title":"FC'05 Financial Cryptography and Data Security 2005"},{"key":"ref11","first-page":"372","article-title":"IC identification circuit using device mismatch","author":"lofstrom","year":"2000","journal-title":"IEEE ISSCC Dig"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"ref13","first-page":"1200","article-title":"Extracting secrete keys from integrated circuits","author":"lim","year":"2005","journal-title":"Symp VLSI Circuits Dig"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"ref15","first-page":"406","article-title":"A 1.6 pJ\/bit 96% stable chip-ID generating circ uit using process variations","author":"su","year":"2007","journal-title":"IEEE ISSCC Dig"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ESSCIRC.2008.4681809"},{"key":"ref17","first-page":"116","article-title":"Silicon physical unclonable function resistant to a 10<formula formulatype=\"inline\"><tex Notation=\"TeX\">$^{25}$<\/tex> <\/formula>-trial brute force attack in 90 nm CMOS","author":"stanzione","year":"2009","journal-title":"Symp VLSI Circuits 2009 Dig"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1974.9409"},{"key":"ref4","first-page":"388","volume":"lncs 1666","author":"kocher","year":"1999","journal-title":"Advances in Cryptology"},{"key":"ref3","first-page":"1","article-title":"Tamper resistance &#x2013; A cautionary note","author":"anderson","year":"1996","journal-title":"Proc 2nd USENIX Workshop on Electronic Commerce"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2008.214"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0052259","article-title":"Differential fault analysis of secret key crypto systems","author":"biham","year":"1997","journal-title":"Advances in Cryptology ? CRYPTO 97"},{"key":"ref8","author":"pappu","year":"2001","journal-title":"Physical one-way functions"},{"key":"ref7","first-page":"2","article-title":"Optical fault induction attacks","volume":"lncs 2523","author":"skorobogatov","year":"0","journal-title":"Cryptographic Hardware and Embedded Systems Workshop CHES 2002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102206"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/11605805_8","article-title":"RFID-tags for anti-counterfeiting","author":"tuyls","year":"2006","journal-title":"Topics in Cryptology ? CT-RSA 2006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"}],"container-title":["IEEE Journal of Solid-State Circuits"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4\/5772983\/05756461.pdf?arnumber=5756461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:52:54Z","timestamp":1633909974000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5756461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":18,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/jssc.2011.2120650","relation":{},"ISSN":["0018-9200","1558-173X"],"issn-type":[{"value":"0018-9200","type":"print"},{"value":"1558-173X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6]]}}}