{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:03:01Z","timestamp":1767772981186},"reference-count":58,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647783","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-12","source":"Crossref","is-referenced-by-count":3,"title":["FORTRESS: FORtified Tamper-Resistant Envelope with Embedded Security Sensor"],"prefix":"10.1109","author":[{"given":"Kathrin","family":"Garb","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Johannes","family":"Obermaier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elischa","family":"Ferres","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Martin","family":"Kunig","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"article-title":"Using convolutional codes for key extraction in sram physical unclonable functions","year":"2018","author":"muelich","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.30-65"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2517300.2517304"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224310"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.25"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714588"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0056-z"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-020-00223-w"},{"key":"ref35","first-page":"302","article-title":"Pufky: A fully functional puf-based cryptographic key generator","author":"maes","year":"2012","journal-title":"IACR CHES'04"},{"key":"ref34","first-page":"181","article-title":"Efficient helper data key extractor on fpgas","author":"b\u00f6sch","year":"2008","journal-title":"IACR CHES'04"},{"key":"ref28","first-page":"523","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","author":"dodis","year":"2004","journal-title":"IACR Eurocrypt"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/319709.319714","article-title":"A fuzzy commitment scheme","author":"juels","year":"1999","journal-title":"Proceedings of the 6th ACM conference on Computer and communications security"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"journal-title":"Common Criteria Protection Profile &#x2013; Cryptographic Modules Security Level &#x201C;Enhanced&#x201D; (BSI-CC-PP-0045)","year":"2008","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-57pt2r1"},{"journal-title":"Physically Unclonable Functions Constructions Properties and Applications","year":"2012","author":"maes","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-00333-3_18"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2015.7322461"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3089854"},{"key":"ref23","article-title":"Electromagnetic enclosure PUF for tamper proofing commodity hardware and other applications","author":"tobisch","year":"2020","journal-title":"TRUDEVICE"},{"journal-title":"Higher-order alphabet physical unclonable functions","year":"2019","author":"immler","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_29"},{"key":"ref50","first-page":"96","article-title":"On codes correcting bidirectional limited-magnitude errors for flash memories","author":"jeon","year":"2012","journal-title":"2012 International Symposium on Information Theory and its Applications"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2762675"},{"key":"ref58","first-page":"96","article-title":"On codes correcting bidirectional limited-magnitude errors for flash memories","author":"jeon","year":"2012","journal-title":"IEEE ISITA"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1965.1053825"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1964.1053699"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1968.1054109"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1969.1054260"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2858930.2858933"},{"journal-title":"ISO\/IEC 19790 2012 Information technology &#x2013; Security techniques &#x2013; Test requirements for cryptographic modules","year":"2012","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0045-2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2995289.2995293"},{"journal-title":"GORE&#x2122; Tamper Respondent Surface Enclosure","year":"0","key":"ref12"},{"journal-title":"IBM 4765 Cryptographic Coprocessor Security Module","year":"2012","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383890"},{"key":"ref15","first-page":"51","article-title":"Secure physical enclosures from covers with tamper-resistance","author":"immler","year":"2019","journal-title":"IACR CHES'04"},{"journal-title":"Attacks and countermeasures for capacitive puf-based enclosures","year":"2021","key":"ref16"},{"key":"ref17","article-title":"A measurement system for capacitive puf-based security enclosures","author":"obermaier","year":"2018","journal-title":"DAC"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2018.8589716"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MECO.2018.8406028"},{"journal-title":"ISO\/IEC 15408-2 Information technology Security techniques &#x2013; Evaluation criteria for IT security &#x2013; Part 2 Security functional components","year":"2008","key":"ref4"},{"journal-title":"ISO\/IEC 15408-1 Information technology Security techniques &#x2013; Evaluation criteria for IT security &#x2013; Part 1 Introduction and general model","year":"2009","key":"ref3"},{"journal-title":"ISO\/IEC 18045 Information technology &#x2013; Security techniques &#x2013; Methodology for IT security evaluation","year":"2008","key":"ref6"},{"journal-title":"ISO\/IEC 15408-3 Information technology Security techniques &#x2013; Evaluation criteria for IT security &#x2013; Part 3 Security assurance components","year":"2008","key":"ref5"},{"journal-title":"FIPS 140-3 Section 5 - Physical Security","year":"2021","author":"randall","key":"ref8"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0125-6"},{"journal-title":"Security requirements for cryptographic modules","year":"2019","author":"cooper","key":"ref7"},{"journal-title":"ISO\/IEC 24759 2017 Information technology &#x2013; Security techniques &#x2013; Test requirements for cryptographic modules","year":"2017","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254007"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SiPS47522.2019.9020613"},{"key":"ref48","first-page":"332","author":"maes","year":"2009","journal-title":"Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2864594"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"ref41","first-page":"1","article-title":"On error correction for physical unclonable functions","author":"puchinger","year":"2015","journal-title":"ITG SCC"},{"key":"ref44","first-page":"1","article-title":"A new error correction scheme for physical unclonable functions","author":"mueelich","year":"2017","journal-title":"SCC 2017 11th International ITG Conference on Systems Communications and Coding"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2019.8702484"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647783.pdf?arnumber=9647783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:50Z","timestamp":1652201990000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647783\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647783","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}