{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T18:24:41Z","timestamp":1775845481453,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute for Information and communications Technology Promotion","doi-asserted-by":"publisher","award":["2016-0-00399"],"award-info":[{"award-number":["2016-0-00399"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N508664\/-CSIT2"],"award-info":[{"award-number":["EP\/N508664\/-CSIT2"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["NE2019102"],"award-info":[{"award-number":["NE2019102"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771239"],"award-info":[{"award-number":["61771239"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61871216"],"award-info":[{"award-number":["61871216"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010014","name":"Six Talent Peaks Project in Jiangsu Province","doi-asserted-by":"publisher","award":["2018-XYDXX-009"],"award-info":[{"award-number":["2018-XYDXX-009"]}],"id":[{"id":"10.13039\/501100010014","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2021,10,1]]},"DOI":"10.1109\/tetc.2019.2935465","type":"journal-article","created":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T19:59:51Z","timestamp":1567713591000},"page":"1853-1866","source":"Crossref","is-referenced-by-count":72,"title":["A Flip-Flop Based Arbiter Physical Unclonable Function (APUF) Design with High Entropy and Uniqueness for FPGA Implementation"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3028-8004","authenticated-orcid":false,"given":"Chongyan","family":"Gu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8398-8648","authenticated-orcid":false,"given":"Weiqiang","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6262-2329","authenticated-orcid":false,"given":"Yijun","family":"Cui","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2595-7648","authenticated-orcid":false,"given":"Neil","family":"Hanley","sequence":"additional","affiliation":[]},{"given":"Maire","family":"OrNeill","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3152-3245","authenticated-orcid":false,"given":"Fabrizio","family":"Lombardi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1867635.1867644"},{"key":"ref38","article-title":"Intrinsic PUFs from Flip-flops on reconfigurable devices","author":"maes","year":"2008","journal-title":"Proc 3rd Benelux Workshop Inf Syst Secur"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224311"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428066"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495550"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855565"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_26"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2007.910961"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2015.51"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1840845.1840855"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0522"},{"key":"ref2","article-title":"DDoS on dyn impacts twitter, spotify, reddit.","year":"2016"},{"key":"ref1","article-title":"Industrial edge networking components report.","author":"ali","year":"2019"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2017.2713305"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"ref21","article-title":"Automated design, implementation, and evaluation of arbiter-based PUF on FPGA using programmable delay lines","author":"devadas","year":"2014"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_27"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24837-0_2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2017.8050671"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2427259"},{"key":"ref50","first-page":"47","article-title":"Comparison of SRAM and FF PUF in 65nm technology","author":"claes","year":"2011","journal-title":"Proc Nordic Conf Secure IT Syst"},{"key":"ref51","first-page":"237","article-title":"Modeling attacks on physical unclonable functions","author":"r\u00fchrmair","year":"2010","journal-title":"Proc 17th Conf Comput Commun Secur"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2018.8297289"},{"key":"ref10","article-title":"Modeling attack resilient reconfigurable latent obfuscation technique for PUF based lightweight authentication","author":"gao","year":"2017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.22.344"},{"key":"ref40","first-page":"67","article-title":"The butterfly PUF protecting IP on every FPGA","author":"kumar","year":"2008","journal-title":"Proc of the IEEE International Symposium on Hardware-Oriented Security and Trust"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873557"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2012.6208707"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2010.5681438"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865362"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2015.7168788"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3053681"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","article-title":"Extracting secret keys from integrated circuits","volume":"13","author":"lim","year":"2005","journal-title":"IEEE Trans VLSI Syst"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref3","article-title":"Internet of things - SoC and FPGA solutions.","year":"2019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.805"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2043","DOI":"10.1109\/TIFS.2019.2891223","article-title":"Machine-learning attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUFU&#x201D; FSMs","volume":"14","author":"delvaux","year":"2014","journal-title":"IEEE Trans Info Forensics Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC.2016.7905439"},{"key":"ref49","author":"barker","year":"2007","journal-title":"Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2016.2553027"},{"key":"ref46","article-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications","author":"rukhin","year":"2001"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/18.382012"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_17"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2015.7058919"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955011"},{"key":"ref44","first-page":"245","author":"maiti","year":"2013","journal-title":"A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2010.24"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/9635600\/08825549.pdf?arnumber=8825549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:49Z","timestamp":1652194429000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8825549\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,1]]},"references-count":52,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2019.2935465","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,1]]}}}