{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T16:55:14Z","timestamp":1777568114809,"version":"3.51.4"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T00:00:00Z","timestamp":1383264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/tifs.2013.2279798","type":"journal-article","created":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T18:01:30Z","timestamp":1377626490000},"page":"1876-1891","source":"Crossref","is-referenced-by-count":539,"title":["PUF Modeling Attacks on Simulated and Silicon Data"],"prefix":"10.1109","volume":"8","author":[{"given":"Ulrich","family":"Ruhrmair","sequence":"first","affiliation":[]},{"given":"Jan","family":"Solter","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Sehnke","sequence":"additional","affiliation":[]},{"given":"Xiaolin","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Mahmoud","sequence":"additional","affiliation":[]},{"given":"Vera","family":"Stoyanova","sequence":"additional","affiliation":[]},{"given":"Gideon","family":"Dror","sequence":"additional","affiliation":[]},{"given":"Jurgen","family":"Schmidhuber","sequence":"additional","affiliation":[]},{"given":"Wayne","family":"Burleson","sequence":"additional","affiliation":[]},{"given":"Srinivas","family":"Devadas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNANO.2010.2049367"},{"key":"ref38","author":"r\ufffdhrmair","year":"2011","journal-title":"Introduction to Hardware Security and Trust"},{"key":"ref33","author":"pappu","year":"2001","journal-title":"Physical one-way functions"},{"key":"ref32","author":"papadimitriou","year":"2003","journal-title":"Computational Complexity"},{"key":"ref31","first-page":"170","article-title":"Towards robust low cost authentication for pervasive devices","author":"\ufffdzt\ufffdrk","year":"2008","journal-title":"Proc IEEE Percom"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.30"},{"key":"ref37","author":"r\ufffdhrmair","year":"2010","journal-title":"Towards Hardware-Intrinsic Security Foundations and Practice"},{"key":"ref36","first-page":"430","article-title":"Oblivious transfer based on physical unclonable functions (extended abstract)","volume":"6101","author":"r\ufffdhrmair","year":"2010","journal-title":"Proc TRUST 2010"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1993.298623"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1502781.1502786"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711471"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-45528-0"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195099713.001.0001","author":"b\ufffdck","year":"1996","journal-title":"Evolutionary Algorithms in Theory and Practice Evolution Strategies Evolutionary Programming Genetic Algorithms"},{"key":"ref20","article-title":"Initial sram state as a fingerprint and source of true random numbers for RFID tags","author":"holcomb","year":"2007","journal-title":"Proc Conf RFID Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559053"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1063\/1.3396186"},{"key":"ref24","author":"lim","year":"2004","journal-title":"Extracting secret keys from integrated circuits"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2008.4700636"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412622"},{"key":"ref51","author":"delvaux","year":"0","journal-title":"Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2008.4519377"},{"key":"ref11","year":"2004","journal-title":"System and Method of Reliable Forward Secret Key Sharing With Physical Random Functions"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1007\/978-3-642-14577-3_26","article-title":"Security applications of diodes with unique current-voltage characteristics","author":"r\ufffdhrmair","year":"2010","journal-title":"Financial Cryptography and Data Security"},{"key":"ref12","author":"van dijk","year":"2012","journal-title":"Physical unclonable functions in cryptographic protocols Security proofs and impossibility results"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"ref14","author":"gassend","year":"2003","journal-title":"Physical random functions"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176287"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.805"},{"key":"ref18","first-page":"63","article-title":"FPGA intrinsic PUFs and their use for IP protection","author":"guajardo","year":"0","journal-title":"Proceedings of CHES 2007"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581556"},{"key":"ref4","first-page":"51","article-title":"Physical unclonable functions in the universal composition framework","author":"brzuska","year":"0","journal-title":"Proc CRYPTO 2011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/76359.76371"},{"key":"ref6","first-page":"1459","article-title":"Characterization of the bistable ring PUF","author":"chen","year":"0","journal-title":"Proc DATE 2012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42045-0_6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CNNA.2010.5430303"},{"key":"ref49","first-page":"358","article-title":"Lightweight and secure PUF key storage using limits of machine learning","author":"yu","year":"2011","journal-title":"Proc CHES"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_5"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"ref45","author":"s\ufffdlter","year":"2009","journal-title":"Cryptanalysis of Electrical PUFs via Machine Learning Algorithms"},{"key":"ref48","author":"tuyls","year":"2007","journal-title":"Security Privacy and Trust in Modern Data Management"},{"key":"ref47","first-page":"369","article-title":"Read-proof hardware from protective coatings","author":"tuyls","year":"2006","journal-title":"CHES"},{"key":"ref42","author":"r\ufffdhrmair","year":"2009","journal-title":"On the foundations of physical unclonable functions"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866335"},{"key":"ref44","author":"schwefel","year":"1993","journal-title":"Evolution and Optimum Seeking The Sixth Generation"},{"key":"ref43","first-page":"999","article-title":"PyBrain","volume":"1","author":"schaul","year":"2010","journal-title":"J Mach Learning Res"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6609092\/06587277.pdf?arnumber=6587277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T23:29:28Z","timestamp":1646436568000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6587277\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":51,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2013.2279798","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11]]}}}