{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T15:44:18Z","timestamp":1771515858833,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/reconfig.2013.6732277","type":"proceedings-article","created":{"date-parts":[[2014,2,10]],"date-time":"2014-02-10T11:26:59Z","timestamp":1392031619000},"page":"1-6","source":"Crossref","is-referenced-by-count":16,"title":["Design of low area-overhead ring oscillator PUF with large challenge space"],"prefix":"10.1109","author":[{"given":"Durga Prasad","family":"Sahoo","sequence":"first","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Rajat Subhra","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.25"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2011.6132673"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.805"},{"key":"16","first-page":"657","article-title":"A systematic method to evaluate and compare the performance of physical unclonable functions","volume":"2011","author":"maiti","year":"2011","journal-title":"IACR Cryptology ePrint Archive"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2007.34"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2006.311193"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2165540"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2004.1382597"},{"key":"3","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"Design Automation Con-ference"},{"key":"2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-642-14452-3_1","article-title":"Physically unclonable functions: A study on the state of the art and future research directions","author":"maes","year":"2010","journal-title":"Towards Hardware-Intrinsic Security Ser Information Security and Cryptography"},{"key":"1","author":"pappu","year":"2001","journal-title":"Physical one-way functions"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2011.2173770"},{"key":"7","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/978-3-642-14452-3_3","article-title":"From statistics to circuits: Foundations for future physical unclonable functions","author":"kim","year":"2010","journal-title":"Towards Hardware-Intrinsic Security Ser Information Security and Cryptography"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2011.88"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873557"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513105"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9088-4"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.094"}],"event":{"name":"2013 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","location":"Cancun, Mexico","start":{"date-parts":[[2013,12,9]]},"end":{"date-parts":[[2013,12,11]]}},"container-title":["2013 International Conference on Reconfigurable Computing and FPGAs (ReConFig)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6720231\/6732246\/06732277.pdf?arnumber=6732277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T03:36:30Z","timestamp":1498102590000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6732277\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/reconfig.2013.6732277","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}