{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T10:17:56Z","timestamp":1769854676998,"version":"3.49.0"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. II"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/tcsii.2016.2602828","type":"journal-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T14:27:47Z","timestamp":1472221667000},"page":"827-831","source":"Crossref","is-referenced-by-count":18,"title":["Physically Unclonable Function Using an Initial Waveform of Ring Oscillators"],"prefix":"10.1109","volume":"64","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1373-2812","authenticated-orcid":false,"given":"Tetsufumi","family":"Tanamoto","sequence":"first","affiliation":[]},{"given":"Shinich","family":"Yasuda","sequence":"additional","affiliation":[]},{"given":"Satoshi","family":"Takaya","sequence":"additional","affiliation":[]},{"given":"Shinobu","family":"Fujita","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"0","journal-title":"Proc of 44th DAC"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513108"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2009.5272361"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873557"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2013.79"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513105"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2287182"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559053"},{"key":"ref18","first-page":"17","article-title":"Intrinsic PUFs from flip-flops on reconfigurable devices","author":"maes","year":"0","journal-title":"Proc of WISS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_26"},{"key":"ref4","first-page":"63","article-title":"FPGA intrinsic PUFs and their use for IP protection","author":"guajardo","year":"0","journal-title":"Proc 9th Int Workshop CHES"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMAG.2014.2325646"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2015.2503707"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LED.2014.2385870"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","article-title":"Extracting secret keys from integrated circuits","volume":"13","author":"lim","year":"2005","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIT.2015.7223695"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2015.2468927"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2016.2530800"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2013.2279875"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2014.2362715"},{"key":"ref24","first-page":"254","article-title":"A physically unclonable function with $\\text{BER} < 10^{-8}$ for robust chip authentication using oscillator collapse in 40 nm CMOS","author":"yang","year":"0","journal-title":"Proc IEEE ISSCC"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2010.24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2011.18"}],"container-title":["IEEE Transactions on Circuits and Systems II: Express Briefs"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8920\/7956382\/07553452.pdf?arnumber=7553452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:41:07Z","timestamp":1641987667000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7553452\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":25,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tcsii.2016.2602828","relation":{},"ISSN":["1549-7747","1558-3791"],"issn-type":[{"value":"1549-7747","type":"print"},{"value":"1558-3791","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7]]}}}