{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:24:33Z","timestamp":1764332673091,"version":"build-2065373602"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"JSPS KAKENHI","award":["17H00729"],"award-info":[{"award-number":["17H00729"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. I"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/tcsi.2018.2869086","type":"journal-article","created":{"date-parts":[[2018,9,26]],"date-time":"2018-09-26T19:24:02Z","timestamp":1537989842000},"page":"616-629","source":"Crossref","is-referenced-by-count":13,"title":["Efficient Fuzzy Extractors Based on Ternary Debiasing Method for Biased Physically Unclonable Functions"],"prefix":"10.1109","volume":"66","author":[{"given":"Manami","family":"Suzuki","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9754-6792","authenticated-orcid":false,"given":"Rei","family":"Ueno","sequence":"additional","affiliation":[]},{"given":"Naofumi","family":"Homma","sequence":"additional","affiliation":[]},{"given":"Takafumi","family":"Aoki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2427259"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2300635"},{"key":"ref10","article-title":"An accurate probabilistic reliability model for silicon PUFs","author":"maes","year":"2013","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"ref11","first-page":"63","article-title":"FPGA intrinsic PUFs and their use for IP protection","author":"guajardo","year":"2007","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","article-title":"Extracting secret keys from integrated circuits","volume":"13","author":"lim","year":"2005","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2370531"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_12"},{"journal-title":"Concatenated Codes","year":"1966","author":"forney","key":"ref16"},{"key":"ref17","article-title":"Efficient fuzzy extraction of PUF-induced secrets: Theory and applications","author":"delvaux","year":"2016","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2733582"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.25"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39757-4_5"},{"key":"ref4","article-title":"Various techniques used in connection with random digits","volume":"12","author":"von neumann","year":"1951","journal-title":"Appl Math Ser"},{"key":"ref27","first-page":"117","article-title":"Reusable fuzzy extractors for low-entropy distributions","author":"canetti","year":"2016","journal-title":"Proc Int Conf Theory Appl Cryptograph Techn (EUROCRYPT)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855566"},{"key":"ref6","first-page":"601","article-title":"Hiding secrecy leakage in leaky helper data","author":"hiller","year":"2017","journal-title":"Proc Cryptograph Hardware Embedded Syst Conf"},{"article-title":"Security analysis of PUF-based key generation and entity authentication","year":"2017","author":"delvaux","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0044-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64647-3_15"},{"key":"ref7","article-title":"End-to-end design of a PUF-based privacy preserving authentication protocol","volume":"9293","author":"aysu","year":"2015","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref2","first-page":"517","article-title":"Secure key generation from biased PUFs","author":"maes","year":"2015","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2007.910961"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41395-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224310"},{"key":"ref22","article-title":"A trivial debiasing scheme for helper data systems","author":"\u0161kori?","year":"2017","journal-title":"J Cryptograph Eng"},{"key":"ref21","first-page":"134","article-title":"A new maskless debiasing method for lightweight physical unclonable functions","author":"aysu","year":"2017","journal-title":"Proc IEEE Int Symp"},{"key":"ref24","first-page":"1","article-title":"An efficient reliable PUF-based cryptographic key generator in 65 nm CMOS","author":"bhargava","year":"2014","journal-title":"Proc Conf Design Autom Test Eur (DATE)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955010"},{"article-title":"Dynamic behavior of RS latches using FIB processing and probe connection","year":"2014","author":"torii","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0091-9"}],"container-title":["IEEE Transactions on Circuits and Systems I: Regular Papers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8919\/8620440\/08472253.pdf?arnumber=8472253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:57:03Z","timestamp":1657745823000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8472253\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":31,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcsi.2018.2869086","relation":{},"ISSN":["1549-8328","1558-0806"],"issn-type":[{"type":"print","value":"1549-8328"},{"type":"electronic","value":"1558-0806"}],"subject":[],"published":{"date-parts":[[2019,2]]}}}