{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:50:57Z","timestamp":1730292657442,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T00:00:00Z","timestamp":1372636800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T00:00:00Z","timestamp":1372636800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/recosoc.2013.6581531","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:13:41Z","timestamp":1377724421000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["A new model for estimating bit error probabilities of Ring-Oscillator PUFs"],"prefix":"10.1109","author":[{"given":"Matthias","family":"Hiller","sequence":"first","affiliation":[{"name":"Institute for Security in Information Technology, Technische Universit&#x00E4;t M&#x00FC;nchen, Munich, Germany"}]},{"given":"Georg","family":"Sigl","sequence":"additional","affiliation":[{"name":"Institute for Security in Information Technology, Technische Universit&#x00E4;t M&#x00FC;nchen, Munich, Germany"}]},{"given":"Michael","family":"Pehl","sequence":"additional","affiliation":[{"name":"Institute for Security in Information Technology, Technische Universit&#x00E4;t M&#x00FC;nchen, Munich, Germany"}]}],"member":"263","reference":[{"key":"19","first-page":"283","article-title":"PUFs: Myth, fact or busted? a security evaluation of physically unclonable functions (PUFs) cast in silicon","volume":"7428","author":"katzenbeisser","year":"2012","journal-title":"Interna-tional Workshop on Cryptographic Hardware and Embedded Systems (CHES) Ser LNCS"},{"key":"17","first-page":"1","article-title":"A multiple bits output ring-oscillator physical unclonable function","author":"hu","year":"2011","journal-title":"IEEE International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS)"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9088-4"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513105"},{"key":"16","first-page":"1","article-title":"Recombination of physical unclonable functions","author":"yu","year":"2010","journal-title":"GOMACTech Conference"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1531542.1531639"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873557"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89994-5_13"},{"key":"21","first-page":"302","article-title":"PUFKY: A fully functional PUF-based cryptographic key generator","volume":"7428","author":"maes","year":"2012","journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems (CHES) Ser LNCS"},{"journal-title":"Physically Unclonable Functions Constructions Properties and Applications","year":"2012","author":"maes","key":"20"},{"key":"22","article-title":"Extracting keys from integrated circuits","author":"lim","year":"2004","journal-title":"Master's thesis Massachusetts Institute of Technology"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126612400221"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/AHS.2012.6268652"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"26","first-page":"63","article-title":"FPGA intrinsic PUFs and their use for IP protection","volume":"4727","author":"guajardo","year":"2007","journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems (CHES) Ser LNCS"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/2072274.2072276"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9088-4"},{"journal-title":"A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions","year":"2011","author":"maiti","key":"29"},{"journal-title":"Analog Design Centering and Sizing","year":"2007","author":"graeb","key":"3"},{"journal-title":"FPGA-oriented Secu-rity","year":"2011","author":"majzoobi","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513108"},{"key":"1","article-title":"Security for volatile FPGAs","author":"drimer","year":"2009","journal-title":"Technical Report UCAM-CL-TR-763"},{"journal-title":"From Statistics to Circuits Foundations for Future Physical Unclonable Functions","year":"2010","author":"kim","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.25"},{"key":"6","first-page":"332","article-title":"Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs","year":"2009","journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems (CHES) Ser LNCS"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205263"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.10"},{"key":"4","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_16"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224310"}],"event":{"name":"2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC)","start":{"date-parts":[[2013,7,10]]},"location":"Darmstadt, Germany","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6575424\/6581516\/06581531.pdf?arnumber=6581531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T18:40:25Z","timestamp":1677177625000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6581531\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/recosoc.2013.6581531","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}