{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T10:06:26Z","timestamp":1769853986440,"version":"3.49.0"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-20-CYAL-0007"],"award-info":[{"award-number":["ANR-20-CYAL-0007"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002347","name":"German Federal Ministry of Education and Research (BMBF) within the project APRIORI","doi-asserted-by":"publisher","award":["16KIS1389K"],"award-info":[{"award-number":["16KIS1389K"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. I"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tcsi.2022.3208325","type":"journal-article","created":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T19:54:30Z","timestamp":1664394870000},"page":"5121-5134","source":"Crossref","is-referenced-by-count":7,"title":["Interleaved Challenge Loop PUF: A Highly Side-Channel Protected Oscillator-Based PUF"],"prefix":"10.1109","volume":"69","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2014-7184","authenticated-orcid":false,"given":"Lars","family":"Tebelmann","sequence":"first","affiliation":[{"name":"Chair of Security in Information Technology, TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany\\break"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5063-7964","authenticated-orcid":false,"given":"Jean-Luc","family":"Danger","sequence":"additional","affiliation":[{"name":"T&#x00E9;l&#x00E9;com Paris, Institut Polytechnique de Paris, Palaiseau, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6100-7714","authenticated-orcid":false,"given":"Michael","family":"Pehl","sequence":"additional","affiliation":[{"name":"Chair of Security in Information Technology, TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany\\break"}]}],"member":"263","reference":[{"key":"ref33","first-page":"245","author":"maiti","year":"2013","journal-title":"A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions"},{"key":"ref32","first-page":"137","article-title":"Side channel modeling attacks on 65 nm arbiter PUFs exploiting CMOS device noise","author":"delvaux","year":"2013","journal-title":"Proc IEEE Int Symp Hardw -Oriented Secur Trust (HOST)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0064"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_26"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.23919\/FPL.2017.8056795"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89915-8_13"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581558"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383899"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/9781316450840.014"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2697840"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.30-65"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711445"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i2.1-36"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581559"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140230"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2072274.2072276"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16350-1_4"},{"key":"ref29","article-title":"Active and passive side-channel attacks on delay based PUF designs","author":"becker","year":"2014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3338508.3359569"},{"key":"ref8","first-page":"293","article-title":"Self-secured PUF: Protecting the loop PUF by masking","author":"tebelmann","year":"2020","journal-title":"Constructive Side-Channel Analysis and Secure Design"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541835"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IWASI.2019.8791249"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2012.22"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21599-5_3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3139324.3139328"},{"key":"ref21","first-page":"334","article-title":"Protecting PUF error correction by codeword masking","volume":"334","author":"merli","year":"2013","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2370531"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2517300.2517304"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_27"},{"key":"ref25","first-page":"237","article-title":"Modeling attacks on physical unclonable functions","author":"r\u00fchrmair","year":"2010","journal-title":"Proc 17th ACM Conf Comput Commun Secur"}],"container-title":["IEEE Transactions on Circuits and Systems I: Regular Papers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8919\/9985434\/09904966.pdf?arnumber=9904966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T21:24:23Z","timestamp":1673299463000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9904966\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":34,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tcsi.2022.3208325","relation":{},"ISSN":["1549-8328","1558-0806"],"issn-type":[{"value":"1549-8328","type":"print"},{"value":"1558-0806","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}