{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T15:36:30Z","timestamp":1772206590892,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100011447","name":"Science and Technology Project of Henan Province","doi-asserted-by":"publisher","award":["232102211076"],"award-info":[{"award-number":["232102211076"]}],"id":[{"id":"10.13039\/501100011447","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Engineering and Physical Sciences Research Council (EPSRC) New Investigator Award","award":["EP\/X009602\/1"],"award-info":[{"award-number":["EP\/X009602\/1"]}]},{"name":"Innovate U.K. Safety Critical Harsh Environment Micro-Processing Evolution (SCHEME) Project","award":["IUK10065634"],"award-info":[{"award-number":["IUK10065634"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. I"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1109\/tcsi.2024.3466972","type":"journal-article","created":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T17:49:24Z","timestamp":1728409764000},"page":"573-585","source":"Crossref","is-referenced-by-count":11,"title":["A High-Reliability, Non-CRP-Discard Arbiter PUF Based on Delay Difference Quantization"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4841-4232","authenticated-orcid":false,"given":"Yao","family":"Wang","sequence":"first","affiliation":[{"name":"School of Electrical and Information Engineering, Zhengzhou University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0525-0858","authenticated-orcid":false,"given":"Guangyang","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electrical and Information Engineering, Zhengzhou University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8369-1478","authenticated-orcid":false,"given":"Xue","family":"Mei","sequence":"additional","affiliation":[{"name":"School of Electrical and Information Engineering, Zhengzhou University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3028-8004","authenticated-orcid":false,"given":"Chongyan","family":"Gu","sequence":"additional","affiliation":[{"name":"Centre for Secure Information Technologies (CSIT), Queen&#x2019;s University Belfast, Belfast, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref5","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","volume-title":"Proc. 44th ACM IEEE Design Autom. Conf.","author":"Suh"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3264016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.805"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9088-4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2870835"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2012.6330625"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ESSCIRC.2012.6341361"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2370531"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165284"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3028514"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3197529"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495550"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tcad.2017.2740297"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ETS56758.2023.10174198"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711471"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2015.51"},{"key":"ref22","article-title":"Automated design, implementation, and evaluation of arbiter-based PUF on FPGA using programmable delay lines","author":"Majzoobi","year":"2014","journal-title":"Cryptol. ePrint Arch."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3267657"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/isscc19947.2020.9063075"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_18"},{"key":"ref26","article-title":"Exploiting PUF models for error free response generation","author":"Gao","year":"2017","journal-title":"arXiv:1701.08241"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.179"},{"issue":"3","key":"ref28","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1109\/JSSC.2019.2951415","article-title":"A physical unclonable function with bit error rate < 2.3 \u00d7 10\u22128 based on contact formation probability without error correction code","volume":"55","author":"Jeon","year":"2020","journal-title":"IEEE J. Solid-State Circuits"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140233"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428066"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2022.3189351"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2017.7870303"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.083"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LSSC.2018.2879216"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ASSCC.2018.8579315"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2016.125"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062315"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2427259"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2891223"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-022-00284-z"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2013.2296525"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3206227"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2962115"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3314058"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/FPL53798.2021.00018"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICSICT55466.2022.9963428"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2749226"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED48828.2020.9136974"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866335"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_27"},{"key":"ref51","article-title":"Breaking XOR arbiter PUFs without reliability information","author":"Sayadi","year":"2023","journal-title":"arXiv:2312.01256"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2021.3114084"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3036807"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-022-06034-7"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2935465"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.3028508"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3228635"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3090475"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3263621"}],"container-title":["IEEE Transactions on Circuits and Systems I: Regular Papers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8919\/10857679\/10707654.pdf?arnumber=10707654","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T05:47:25Z","timestamp":1738216045000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10707654\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":59,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcsi.2024.3466972","relation":{},"ISSN":["1549-8328","1558-0806"],"issn-type":[{"value":"1549-8328","type":"print"},{"value":"1558-0806","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2]]}}}