{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:48:13Z","timestamp":1775746093981,"version":"3.50.1"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Micro"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/mm.2017.4241357","type":"journal-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T19:10:44Z","timestamp":1511464244000},"page":"72-89","source":"Crossref","is-referenced-by-count":80,"title":["Hardware Designs for Security in Ultra-Low-Power IoT Systems: An Overview and Survey"],"prefix":"10.1109","volume":"37","author":[{"given":"Kaiyuan","family":"Yang","sequence":"first","affiliation":[]},{"given":"David","family":"Blaauw","sequence":"additional","affiliation":[]},{"given":"Dennis","family":"Sylvester","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581556"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2017.7870303"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2014.6757433"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_18"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2370531"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2000.839821"},{"key":"ref37","first-page":"256","article-title":"15fJ\/b Static Physically Unclonable Functions for Secure Chip Identification with <2% Native Bit Instability and 140x Inter\/Intra PUF Hamming Distance Separation in 65nm","author":"alvarez","year":"0","journal-title":"Proc IEEE Int'l Solid-State Circuits Conf"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2007.910961"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"ref34","first-page":"158","article-title":"Physically Unclonable Function for Secure Key Generation with a Key Error Rate of 2E-38 in 45 nm Smart-Card Chips","author":"karpinskyy","year":"0","journal-title":"Proc IEEE Int'l Solid-State Circuits Conf"},{"key":"ref28","article-title":"Recommendation for the Entropy Sources Used for Random Bit Generation","author":"turan","year":"2016","journal-title":"report 800-90B"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2016.2558490"},{"key":"ref29","first-page":"200","article-title":"A 10 nm 32Kb Low-Voltage Logic-Compatible Anti-fuse One-Time-Programmable Memory with Anti-tampering Sensing Scheme","author":"chou","year":"0","journal-title":"Proc IEEE Int l Solid-State Circuits Conf"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190581"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_23"},{"key":"ref21","article-title":"Analysis of Intel's Ivy Bridge Digital Random Number Generator","author":"hamburg","year":"2012","journal-title":"Tech Report"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2014.6946136"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2014.6757434"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2017.7870302"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1022","DOI":"10.1109\/JSSC.2016.2519383","article-title":"An All-Digital Edge Racing True Random Number Generator Robust Against PVT Variations","volume":"51","author":"yang","year":"2016","journal-title":"IEEE J Solid-State Circuits"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.23919\/VLSIC.2017.8008503"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.23919\/VLSIC.2017.8008504"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080227"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.23919\/VLSIC.2017.8008501"},{"key":"ref10","first-page":"403","article-title":"A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards","author":"tiri","year":"0","journal-title":"Proc 28th European Solid-State Circuits Conf"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1393921.1393990"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2015.7231274"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2009.4977309"},{"key":"ref14","article-title":"A Testing Methodology for Side-Channel Resistance Validation","author":"gilbert goodwill","year":"0","journal-title":"Non-Invasive Attack Testing Workshop"},{"key":"ref15","first-page":"251","article-title":"Electromagnetic Analysis: Concrete Results","author":"gandolfi","year":"2001","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"ref16","article-title":"A Local EM-Analysis Attack Resistant Cryptographic Engine with Fully-Digital Oscillator-Based Tamper-Access Sensor","author":"miuraetal","year":"0","journal-title":"Proc of Symposium on VISI Circuits"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/81.847868"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2012.2217631"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2007.910965"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2011.2108131"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2818186"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_16"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2006.40"},{"key":"ref8","article-title":"A Compact 446 Gbps\/W AES Accelerator for Mobile SoC and IoT in 40nm","author":"zhang","year":"0","journal-title":"Proc IEEE Symp VLSI Circuits"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2014.2384039"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_27"},{"key":"ref9","first-page":"388","article-title":"Differential Power Analysis","author":"kocher","year":"1999","journal-title":"Advances in Cryptology"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22846-4_2"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2016.2553027"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2427259"},{"key":"ref47","first-page":"254","article-title":"A Physically Unclonable Function with BER <10?8 for Robust Chip Authentication using Oscillator Collapse in 40nm CMOS","author":"yang","year":"0","journal-title":"Proc IEEE Int'l Solid-State Circuits Conf"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"ref41","first-page":"237","article-title":"Modeling Attacks on Physical Unclonable Functions","author":"r\u00fchrmair","year":"0","journal-title":"Proc 17th ACM Conf Computer and Communications Security"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855582"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.30"}],"container-title":["IEEE Micro"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/40\/8119639\/08119706.pdf?arnumber=8119706","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:35:16Z","timestamp":1642005316000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8119706\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":53,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/mm.2017.4241357","relation":{},"ISSN":["0272-1732"],"issn-type":[{"value":"0272-1732","type":"print"}],"subject":[],"published":{"date-parts":[[2017,11]]}}}